Security-Onion-Solutions / securityonionLinks
Security Onion is a free and open platform for threat hunting, enterprise security monitoring, and log management. It includes our own interfaces for alerting, dashboards, hunting, PCAP, detections, and case management. It also includes other tools such as osquery, CyberChef, Elasticsearch, Logstash, Kibana, Suricata, and Zeek.
☆4,230Updated this week
Alternatives and similar repositories for securityonion
Users that are interested in securityonion are comparing it to the libraries listed below
Sorting:
- Digging Deeper....☆3,621Updated this week
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆2,288Updated this week
- MISP (core software) - Open Source Threat Intelligence and Sharing Platform☆6,035Updated last week
- TheHive is a Collaborative Case Management Platform, now distributed as a commercial version☆3,870Updated 4 months ago
- Shuffle: A general purpose security automation platform. Our focus is on collaboration and resource sharing.☆2,118Updated last week
- Security Onion 16.04 - Linux distro for threat hunting, enterprise security monitoring, and log management☆3,108Updated 4 years ago
- A Suricata based NDR distribution☆1,583Updated 2 months ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,509Updated last year
- A curated list of awesome YARA rules, tools, and people.☆4,094Updated 8 months ago
- Automated Adversary Emulation Platform☆6,612Updated this week
- Modular and decentralised honeypot☆2,701Updated this week
- Open EDR public repository☆2,557Updated last year
- Web app that provides basic navigation and annotation of ATT&CK matrices☆2,269Updated 2 weeks ago
- Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Po…☆3,472Updated last month
- Cortex: a Powerful Observable Analysis and Active Response Engine☆1,518Updated 2 weeks ago
- Loki - Simple IOC and YARA Scanner☆3,694Updated last month
- Main Sigma Rule Repository☆9,865Updated last week
- Your Everyday Threat Intelligence☆1,936Updated last month
- Advanced Wazuh Rules for more accurate threat detection. Feel free to implement within your own Wazuh environment, contribute, or fork!☆1,157Updated last week
- Rapidly Search and Hunt through Windows Forensic Artefacts☆3,387Updated 2 months ago
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆3,025Updated last month
- ✨ A curated list of awesome threat detection and hunting resources 🕵️♂️☆4,425Updated last year
- Open Cyber Threat Intelligence Platform☆8,007Updated this week
- Small and highly portable detection tests based on MITRE's ATT&CK.☆11,357Updated last week
- Automate the creation of a lab environment complete with security tooling and logging best practices☆4,874Updated last year
- IntelOwl: manage your Threat Intelligence at scale☆4,373Updated this week
- Repository of yara rules☆4,614Updated last year
- Cyber Threat Intelligence Repository expressed in STIX 2.0☆1,990Updated 3 weeks ago
- Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.☆2,954Updated last week
- Snort++☆3,199Updated 2 weeks ago