Security-Onion-Solutions / securityonionLinks
Security Onion is a free and open platform for threat hunting, enterprise security monitoring, and log management. It includes our own interfaces for alerting, dashboards, hunting, PCAP, detections, and case management. It also includes other tools such as osquery, CyberChef, Elasticsearch, Logstash, Kibana, Suricata, and Zeek.
☆3,936Updated this week
Alternatives and similar repositories for securityonion
Users that are interested in securityonion are comparing it to the libraries listed below
Sorting:
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆2,209Updated this week
- Digging Deeper....☆3,460Updated this week
- A Suricata based IDS/IPS/NSM distro☆1,562Updated last month
- TheHive: a Scalable, Open Source and Free Security Incident Response Platform☆3,813Updated last month
- MISP (core software) - Open Source Threat Intelligence and Sharing Platform☆5,897Updated last week
- Modular and decentralised honeypot☆2,583Updated 3 months ago
- Loki - Simple IOC and YARA Scanner☆3,640Updated this week
- A curated list of awesome YARA rules, tools, and people.☆3,967Updated 5 months ago
- Automated Adversary Emulation Platform☆6,410Updated last week
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,515Updated last year
- Cortex: a Powerful Observable Analysis and Active Response Engine☆1,473Updated last month
- Security Onion 16.04 - Linux distro for threat hunting, enterprise security monitoring, and log management☆3,103Updated 4 years ago
- Web app that provides basic navigation and annotation of ATT&CK matrices☆2,214Updated 3 weeks ago
- Shuffle: A general purpose security automation platform. Our focus is on collaboration and resource sharing.☆2,050Updated last week
- Main Sigma Rule Repository☆9,594Updated last week
- Open EDR public repository☆2,508Updated last year
- Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.☆2,813Updated last week
- Malware Configuration And Payload Extraction☆2,659Updated this week
- Rapidly Search and Hunt through Windows Forensic Artefacts☆3,268Updated 3 weeks ago
- Your Everyday Threat Intelligence☆1,901Updated 3 weeks ago
- Best Practice Auditd Configuration☆1,678Updated 7 months ago
- This repository contains the scanner component for Greenbone Community Edition.☆4,039Updated this week
- RedEye is a visual analytic tool supporting Red & Blue Team operations☆2,731Updated last year
- Open Cyber Threat Intelligence Platform☆7,722Updated this week
- Repository of yara rules☆4,515Updated last year
- Advanced Wazuh Rules for more accurate threat detection. Feel free to implement within your own Wazuh environment, contribute, or fork!☆1,052Updated last month
- Zeek is a powerful network analysis framework that is much different from the typical IDS you may know.☆7,124Updated this week
- Cyber Threat Intelligence Repository expressed in STIX 2.0☆1,941Updated last month
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆2,993Updated last week
- Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine developed by the OIS…☆5,558Updated last week