Security-Onion-Solutions / securityonionLinks
Security Onion is a free and open platform for threat hunting, enterprise security monitoring, and log management. It includes our own interfaces for alerting, dashboards, hunting, PCAP, detections, and case management. It also includes other tools such as osquery, CyberChef, Elasticsearch, Logstash, Kibana, Suricata, and Zeek.
☆4,326Updated this week
Alternatives and similar repositories for securityonion
Users that are interested in securityonion are comparing it to the libraries listed below
Sorting:
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆2,330Updated this week
- Digging Deeper....☆3,726Updated last week
- TheHive is a Collaborative Case Management Platform, now distributed as a commercial version☆3,876Updated 6 months ago
- Web app that provides basic navigation and annotation of ATT&CK matrices☆2,311Updated this week
- MISP (core software) - Open Source Threat Intelligence and Sharing Platform☆6,110Updated this week
- Automated Adversary Emulation Platform☆6,717Updated this week
- Open EDR public repository☆2,599Updated 2 years ago
- A Suricata based NDR distribution☆1,588Updated 4 months ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,515Updated 3 weeks ago
- Security Onion 16.04 - Linux distro for threat hunting, enterprise security monitoring, and log management☆3,107Updated 4 years ago
- Shuffle: A general purpose security automation platform. Our focus is on collaboration and resource sharing.☆2,171Updated last week
- A curated list of awesome YARA rules, tools, and people.☆4,130Updated 10 months ago
- RedEye is a visual analytic tool supporting Red & Blue Team operations☆2,739Updated 2 years ago
- Cortex: a Powerful Observable Analysis and Active Response Engine☆1,539Updated 2 months ago
- Modular and decentralised honeypot☆2,751Updated 3 weeks ago
- Rapidly Search and Hunt through Windows Forensic Artefacts☆3,438Updated 3 months ago
- IntelOwl: manage your Threat Intelligence at scale☆4,432Updated this week
- Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.☆3,002Updated this week
- Cybersecurity Evaluation Tool☆1,757Updated this week
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆3,043Updated 3 months ago
- Loki - Simple IOC and YARA Scanner☆3,712Updated 3 weeks ago
- Small and highly portable detection tests based on MITRE's ATT&CK.☆11,534Updated 2 weeks ago
- ✨ A curated list of awesome threat detection and hunting resources 🕵️♂️☆4,482Updated 3 weeks ago
- Cyber Threat Intelligence Repository expressed in STIX 2.0☆2,022Updated last month
- A repository of sysmon configuration modules☆2,958Updated last year
- Open Cyber Threat Intelligence Platform☆8,147Updated this week
- Advanced Wazuh Rules for more accurate threat detection. Feel free to implement within your own Wazuh environment, contribute, or fork!☆1,203Updated last week
- Malwoverview is a rapid response tool used to gather intelligence information from VirusTotal, Hybrid Analysis, URLHaus, Polyswarm, Malsh…☆3,523Updated 2 weeks ago
- Logging Made Easy (LME) is a no cost, open source platform that centralizes log collection, enhances threat detection, and enables real-t…☆1,365Updated this week
- Malware Configuration And Payload Extraction☆2,975Updated this week