Security-Onion-Solutions / security-onion
Security Onion 16.04 - Linux distro for threat hunting, enterprise security monitoring, and log management
☆3,085Updated 4 years ago
Alternatives and similar repositories for security-onion
Users that are interested in security-onion are comparing it to the libraries listed below
Sorting:
- Modern Honey Network☆2,450Updated 5 months ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,509Updated 10 months ago
- Loki - Simple IOC and YARA Scanner☆3,530Updated 5 months ago
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆2,118Updated this week
- The Artillery Project is an open-source blue team tool designed to protect Linux and Windows operating systems through multiple methods.☆1,017Updated 3 years ago
- Arkime is an open source, large scale, full packet capturing, indexing, and database system.☆6,630Updated this week
- Your Everyday Threat Intelligence☆1,850Updated last week
- MISP (core software) - Open Source Threat Intelligence and Sharing Platform☆5,686Updated last week
- Zeek is a powerful network analysis framework that is much different from the typical IDS you may know.☆6,861Updated this week
- OSSEC is an Open Source Host-based Intrusion Detection System that performs log analysis, file integrity checking, policy monitoring, roo…☆4,718Updated 3 months ago
- GRR Rapid Response: remote live forensics for incident response☆4,891Updated 3 weeks ago
- A network sniffer that logs all DNS server replies for use in a passive DNS setup☆1,695Updated 11 months ago
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆2,884Updated 10 months ago
- Security Onion is a free and open platform for threat hunting, enterprise security monitoring, and log management. It includes our own in…☆3,700Updated this week
- An informational repo about hunting for adversaries in your IT environment.☆1,775Updated 3 years ago
- Cuckoo Sandbox is an automated dynamic malware analysis system☆5,684Updated 3 years ago
- A toolset to make a system look as if it was the victim of an APT attack☆2,591Updated last year
- Empire is a PowerShell and Python post-exploitation agent.☆7,609Updated 5 years ago
- A Suricata based IDS/IPS/NSM distro☆1,531Updated 9 months ago
- Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability in long term o…☆2,458Updated 3 months ago
- Repository of yara rules☆4,390Updated last year
- A curated list of awesome YARA rules, tools, and people.☆3,804Updated last month
- TheHive: a Scalable, Open Source and Free Security Incident Response Platform☆3,655Updated 2 years ago
- Configuration files for the SOF-ELK VM☆1,583Updated last month
- DEPRECATED - MozDef: Mozilla Enterprise Defense Platform☆2,167Updated 3 years ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,667Updated 4 years ago
- The Hunting ELK☆3,829Updated 11 months ago
- Automate the creation of a lab environment complete with security tooling and logging best practices☆4,753Updated 10 months ago
- The Sleuth Kit® (TSK) is a library and collection of command line digital forensics tools that allow you to investigate volume and file s…☆2,798Updated 2 weeks ago
- Six Degrees of Domain Admin☆10,170Updated this week