Security-Onion-Solutions / securityonionLinks
Security Onion is a free and open platform for threat hunting, enterprise security monitoring, and log management. It includes our own interfaces for alerting, dashboards, hunting, PCAP, detections, and case management. It also includes other tools such as osquery, CyberChef, Elasticsearch, Logstash, Kibana, Suricata, and Zeek.
☆4,248Updated this week
Alternatives and similar repositories for securityonion
Users that are interested in securityonion are comparing it to the libraries listed below
Sorting:
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆2,302Updated last week
- Digging Deeper....☆3,635Updated this week
- TheHive is a Collaborative Case Management Platform, now distributed as a commercial version☆3,873Updated 5 months ago
- MISP (core software) - Open Source Threat Intelligence and Sharing Platform☆6,050Updated last week
- A Suricata based NDR distribution☆1,584Updated 3 months ago
- Shuffle: A general purpose security automation platform. Our focus is on collaboration and resource sharing.☆2,120Updated last week
- A curated list of awesome YARA rules, tools, and people.☆4,105Updated 9 months ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,510Updated last year
- Cortex: a Powerful Observable Analysis and Active Response Engine☆1,524Updated last month
- Advanced Wazuh Rules for more accurate threat detection. Feel free to implement within your own Wazuh environment, contribute, or fork!☆1,172Updated last week
- Web app that provides basic navigation and annotation of ATT&CK matrices☆2,275Updated last week
- Modular and decentralised honeypot☆2,714Updated 2 weeks ago
- Security Onion 16.04 - Linux distro for threat hunting, enterprise security monitoring, and log management☆3,109Updated 4 years ago
- Loki - Simple IOC and YARA Scanner☆3,697Updated last month
- Repository of yara rules☆4,632Updated last year
- Main Sigma Rule Repository☆9,932Updated last week
- Zeek is a powerful network analysis framework that is much different from the typical IDS you may know.☆7,323Updated this week
- Automated Adversary Emulation Platform☆6,629Updated this week
- Automate the creation of a lab environment complete with security tooling and logging best practices☆4,880Updated last year
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆3,028Updated 2 months ago
- Open Cyber Threat Intelligence Platform☆8,042Updated this week
- Rapidly Search and Hunt through Windows Forensic Artefacts☆3,403Updated 2 months ago
- Malware Configuration And Payload Extraction☆2,869Updated this week
- Sysmon configuration file template with default high-quality event tracing☆5,323Updated last year
- Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Po…☆3,477Updated last month
- The Hunting ELK☆3,906Updated last year
- Open EDR public repository☆2,576Updated last year
- Your Everyday Threat Intelligence☆1,940Updated last month
- ☆2,366Updated 2 years ago
- Configuration files for the SOF-ELK VM☆1,705Updated last week