☆33Jun 27, 2022Updated 3 years ago
Alternatives and similar repositories for securityonion-cloud
Users that are interested in securityonion-cloud are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- String extraction and classification tool for binary files, designed to extract only the strings that can be considered relevant (i.e. no…☆11Aug 9, 2020Updated 5 years ago
- Notes for High Availability MISP in AWS☆19Nov 6, 2019Updated 6 years ago
- Cypher for Defenders: Leveraging Bloodhound Data Beyond the UI☆26Feb 8, 2024Updated 2 years ago
- Cloud Templates and scripts to deploy mordor environments☆129Mar 3, 2021Updated 5 years ago
- Docker files for Security Onion☆42Jan 28, 2021Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Build Automated Machine Images for MISP☆29Jun 9, 2023Updated 2 years ago
- Web interface for monitoring and interacting with Netflow data stored in Silk repositories.☆13Mar 24, 2019Updated 7 years ago
- Scripts to demonstrate VPC Service Controls between tenant and shared projects☆12Jun 11, 2019Updated 6 years ago
- Sentinel BEC IR☆14Aug 18, 2022Updated 3 years ago
- ☆14Feb 22, 2021Updated 5 years ago
- ☆95Mar 16, 2026Updated last week
- A reimplementation of the EtherApe style display for OS X. Note that this is not a fork of EtherApe. Written in a kinder, gentler, age …☆21Dec 3, 2018Updated 7 years ago
- ☆54Mar 17, 2026Updated last week
- Purple Teaming Attack & Hunt Lab - Terraform☆162Nov 29, 2021Updated 4 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Automation of VPC Traffic Mirror Sessions in AWS☆35Nov 15, 2025Updated 4 months ago
- All my slides for any talks☆23Oct 13, 2024Updated last year
- ☆11Nov 13, 2024Updated last year
- Windows Defender ATP - Advanced Hunting Queries☆22Apr 12, 2018Updated 7 years ago
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆24Aug 1, 2022Updated 3 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆42Aug 10, 2025Updated 7 months ago
- Corelight-Ansible-Roles are a collection of Ansible Roles and playbooks that install, configure, run and manage a variety of Corelight, S…☆16Jun 15, 2021Updated 4 years ago
- Create a MS Word index file from PowerPoint notes and slides☆46Sep 6, 2025Updated 6 months ago
- Collection of reusable references☆14Jan 1, 2026Updated 2 months ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- ☆21Aug 31, 2022Updated 3 years ago
- ☆14Dec 6, 2023Updated 2 years ago
- ☆12Jun 24, 2024Updated last year
- Security Onion + Automation + Response Lab including n8n and Velociraptor☆114Sep 14, 2022Updated 3 years ago
- ☆23Nov 13, 2014Updated 11 years ago
- Anteater is Reconnaissance tool for discovering interesting files and folders in a web application that most likely has been misconfigure…☆13Jun 12, 2024Updated last year
- ☆19Mar 10, 2026Updated 2 weeks ago
- Python wrapper for FileLocator Pro Searches☆12Feb 17, 2020Updated 6 years ago
- An automated deployment tool that creates instrumented Azure environments with vulnerable systems for simulating attacks and testing Micr…☆63Jul 27, 2025Updated 7 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Code samples for Query relational data in Azure☆17Jun 10, 2020Updated 5 years ago
- interpreter for 6502 Apple II in 144 bytes☆13Jul 28, 2015Updated 10 years ago
- ProxMate for chrome☆12Oct 21, 2019Updated 6 years ago
- Strafer: A tool to detect potential infections in Elasticsearch instances☆27Mar 14, 2021Updated 5 years ago
- GitHub action to run Threagile, the agile threat modeling toolkit, on a repo's threagile.yaml file☆14May 3, 2024Updated last year
- Automated Docker MISP container - Malware Information Sharing Platform and Threat Sharing☆104Dec 29, 2023Updated 2 years ago
- ☆50Jan 30, 2026Updated last month