Security-Onion-Solutions / securityonion-docsLinks
☆95Updated this week
Alternatives and similar repositories for securityonion-docs
Users that are interested in securityonion-docs are comparing it to the libraries listed below
Sorting:
- Collection of walkthroughs on various threat hunting techniques☆76Updated 5 years ago
- ☆56Updated 4 years ago
- ☆77Updated 6 years ago
- A curated list of awesome things related to TheHive & Cortex☆184Updated 4 years ago
- This program exports MITRE ATT&CK framework in ELK dashboard☆80Updated 3 years ago
- Learning by Practising - Hack & Detect - A Practical Guide to Hacking and its Detection via network forensics☆77Updated 2 years ago
- A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the…☆62Updated 2 months ago
- Run Velociraptor on Security Onion☆40Updated 3 years ago
- A collection of notebooks built for defensive and offensive operations.☆77Updated 5 years ago
- SOC Workflow App helps Security Analysts and Threat Hunters explore suspicious events, look into raw events arriving at the Elastic Stack…☆94Updated 3 years ago
- ☆53Updated last week
- Zeek Log Cheatsheets☆302Updated 5 months ago
- All-in-one bundle of MISP, TheHive and Cortex☆169Updated 3 years ago
- Configuration Hardening Assessment PowerShell Script (CHAPS)☆188Updated 5 months ago
- The Infosec Community Definitive Guide to Jupyter Notebooks☆131Updated 5 years ago
- ☆61Updated this week
- PatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform☆149Updated 3 years ago
- Tool used to perform threat intelligence against packet data☆36Updated last year
- Passive service locator, a python sniffer that identifies servers, clients, names and much more☆258Updated 2 weeks ago
- Sysmon and wazuh integration with Sigma sysmon rules [updated]☆71Updated 4 years ago
- Collection of resources related to the Center for Threat-Informed Defense☆76Updated last year
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆79Updated this week
- ☆37Updated 5 years ago
- Provides detection capabilities and log conversion to evtx or syslog capabilities☆55Updated 3 years ago
- Threat Hunting with ELK Workshop (InfoSecWorld 2017)☆65Updated 8 years ago
- Web app that provides basic navigation and annotation of ATT&CK matrices☆58Updated 6 years ago
- an awesome list of active defense resources☆129Updated 5 years ago
- Synapse: a Meta Alert Feeder for TheHive, a Security Incident Response Platform☆71Updated 2 years ago
- S2AN - Mapper of Sigma/Suricata Rules/Signatures ➡️ MITRE ATT&CK Navigator☆91Updated 3 years ago
- Wrap any binary into a cached webserver☆57Updated 3 years ago