Security-Onion-Solutions / securityonionLinks
Security Onion is a free and open platform for threat hunting, enterprise security monitoring, and log management. It includes our own interfaces for alerting, dashboards, hunting, PCAP, detections, and case management. It also includes other tools such as osquery, CyberChef, Elasticsearch, Logstash, Kibana, Suricata, and Zeek.
☆3,828Updated this week
Alternatives and similar repositories for securityonion
Users that are interested in securityonion are comparing it to the libraries listed below
Sorting:
- Digging Deeper....☆3,364Updated this week
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆2,164Updated this week
- A Suricata based IDS/IPS/NSM distro☆1,554Updated 11 months ago
- TheHive: a Scalable, Open Source and Free Security Incident Response Platform☆3,782Updated last week
- MISP (core software) - Open Source Threat Intelligence and Sharing Platform☆5,823Updated this week
- Web app that provides basic navigation and annotation of ATT&CK matrices☆2,180Updated 2 weeks ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,514Updated last year
- Shuffle: A general purpose security automation platform. Our focus is on collaboration and resource sharing.☆2,008Updated this week
- Security Onion 16.04 - Linux distro for threat hunting, enterprise security monitoring, and log management☆3,093Updated 4 years ago
- This repository contains the scanner component for Greenbone Community Edition.☆3,974Updated this week
- Automated Adversary Emulation Platform☆6,316Updated this week
- A curated list of awesome YARA rules, tools, and people.☆3,888Updated 4 months ago
- Open EDR public repository☆2,483Updated last year
- Cortex: a Powerful Observable Analysis and Active Response Engine☆1,454Updated 2 weeks ago
- Loki - Simple IOC and YARA Scanner☆3,602Updated 8 months ago
- Rapidly Search and Hunt through Windows Forensic Artefacts☆3,217Updated 3 weeks ago
- Main Sigma Rule Repository☆9,477Updated this week
- Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.☆2,732Updated 2 weeks ago
- Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Po…☆3,308Updated last week
- Modular and decentralised honeypot☆2,545Updated 2 months ago
- Open Cyber Threat Intelligence Platform☆7,570Updated this week
- Cyber Threat Intelligence Repository expressed in STIX 2.0☆1,914Updated 2 months ago
- Cybersecurity Evaluation Tool☆1,606Updated this week
- ☆2,305Updated last year
- Repository of yara rules☆4,466Updated last year
- Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine developed by the OIS…☆5,439Updated last week
- Advanced Wazuh Rules for more accurate threat detection. Feel free to implement within your own Wazuh environment, contribute, or fork!☆821Updated this week
- IntelOwl: manage your Threat Intelligence at scale☆4,216Updated last week
- Automate the creation of a lab environment complete with security tooling and logging best practices☆4,808Updated last year
- Detect Tactics, Techniques & Combat Threats☆2,187Updated last week