Security-Onion-Solutions / securityonion-docsLinks
☆91Updated last week
Alternatives and similar repositories for securityonion-docs
Users that are interested in securityonion-docs are comparing it to the libraries listed below
Sorting:
- Collection of walkthroughs on various threat hunting techniques☆75Updated 5 years ago
- ☆55Updated 4 years ago
- A curated list of awesome things related to TheHive & Cortex☆182Updated 4 years ago
- ☆77Updated 6 years ago
- PatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform☆149Updated 3 years ago
- SOC Workflow App helps Security Analysts and Threat Hunters explore suspicious events, look into raw events arriving at the Elastic Stack…☆94Updated 3 years ago
- This program exports MITRE ATT&CK framework in ELK dashboard☆79Updated 2 years ago
- Learning by Practising - Hack & Detect - A Practical Guide to Hacking and its Detection via network forensics☆75Updated 2 years ago
- an awesome list of active defense resources☆126Updated 5 years ago
- The Infosec Community Definitive Guide to Jupyter Notebooks☆126Updated 5 years ago
- A Splunk App containing Sigma detection rules, which can be updated from a Git repository.☆110Updated 5 years ago
- ☆60Updated last week
- Collection of resources related to the Center for Threat-Informed Defense☆76Updated last year
- Threat Hunting with ELK Workshop (InfoSecWorld 2017)☆65Updated 7 years ago
- All-in-one bundle of MISP, TheHive and Cortex☆169Updated 3 years ago
- Community driven repository of Playbooks and Apps for ThreatConnect.☆72Updated last month
- ☆36Updated 4 years ago
- Synapse: a Meta Alert Feeder for TheHive, a Security Incident Response Platform☆71Updated 2 years ago
- Provides detection capabilities and log conversion to evtx or syslog capabilities☆54Updated 3 years ago
- Passive service locator, a python sniffer that identifies servers, clients, names and much more☆254Updated 2 years ago
- Zeek Log Cheatsheets☆297Updated 2 months ago
- S2AN - Mapper of Sigma/Suricata Rules/Signatures ➡️ MITRE ATT&CK Navigator☆89Updated 2 years ago
- Wrap any binary into a cached webserver☆56Updated 3 years ago
- A live dashboard for a real-time overview of threat intelligence from MISP instances☆203Updated 2 years ago
- A collection of notebooks built for defensive and offensive operations.☆77Updated 5 years ago
- ☆52Updated this week
- Repository for SPEED SIEM Use Case Framework☆56Updated 5 years ago
- ☆133Updated last year
- Run Velociraptor on Security Onion☆40Updated 3 years ago
- A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the…☆63Updated 3 years ago