Security-Onion-Solutions / securityonionLinks
Security Onion is a free and open platform for threat hunting, enterprise security monitoring, and log management. It includes our own interfaces for alerting, dashboards, hunting, PCAP, detections, and case management. It also includes other tools such as osquery, CyberChef, Elasticsearch, Logstash, Kibana, Suricata, and Zeek.
☆3,985Updated this week
Alternatives and similar repositories for securityonion
Users that are interested in securityonion are comparing it to the libraries listed below
Sorting:
- Digging Deeper....☆3,473Updated this week
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆2,234Updated last week
- TheHive: a Scalable, Open Source and Free Security Incident Response Platform☆3,822Updated 2 months ago
- A curated list of awesome YARA rules, tools, and people.☆4,000Updated 6 months ago
- A Suricata based NDR distribution☆1,569Updated 2 weeks ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,512Updated last year
- MISP (core software) - Open Source Threat Intelligence and Sharing Platform☆5,947Updated this week
- Automated Adversary Emulation Platform☆6,451Updated this week
- Web app that provides basic navigation and annotation of ATT&CK matrices☆2,224Updated last week
- Cortex: a Powerful Observable Analysis and Active Response Engine☆1,492Updated 2 months ago
- Modular and decentralised honeypot☆2,599Updated 4 months ago
- Open EDR public repository☆2,533Updated last year
- This repository contains the scanner component for Greenbone Community Edition.☆4,077Updated this week
- Shuffle: A general purpose security automation platform. Our focus is on collaboration and resource sharing.☆2,069Updated this week
- Rapidly Search and Hunt through Windows Forensic Artefacts☆3,307Updated last month
- Loki - Simple IOC and YARA Scanner☆3,648Updated 3 weeks ago
- Malware Configuration And Payload Extraction☆2,696Updated last week
- Advanced Wazuh Rules for more accurate threat detection. Feel free to implement within your own Wazuh environment, contribute, or fork!☆1,090Updated last week
- Security Onion 16.04 - Linux distro for threat hunting, enterprise security monitoring, and log management☆3,103Updated 4 years ago
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆2,999Updated last month
- Your Everyday Threat Intelligence☆1,912Updated last month
- Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.☆2,845Updated last week
- Wazuh - Docker containers☆915Updated last week
- Cyber Threat Intelligence Repository expressed in STIX 2.0☆1,948Updated last month
- An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.☆1,990Updated 4 months ago
- Automate the creation of a lab environment complete with security tooling and logging best practices☆4,836Updated last year
- ☆2,334Updated last year
- Volatility 3.0 development☆3,503Updated last week
- Repository of yara rules☆4,535Updated last year
- Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.☆13,579Updated this week