Security-Onion-Solutions / securityonion-elsa-extras
☆10Updated 7 years ago
Alternatives and similar repositories for securityonion-elsa-extras
Users that are interested in securityonion-elsa-extras are comparing it to the libraries listed below
Sorting:
- ☆11Updated 4 years ago
- ☆24Updated 5 years ago
- ☆36Updated 4 years ago
- A reconnaissance tool that can quickly discover hostnames from a list of IP addresses.☆38Updated 14 years ago
- SystemInspector is a script to pull a majority of the security-relevant files and settings from a system.☆18Updated 7 years ago
- Metadata Inspection Database Alerting System☆42Updated 11 years ago
- Host files with DNS☆32Updated 9 years ago
- Repository for the OWASP/WASC Distributed Web Honeypots Project -☆31Updated 10 years ago
- Ansible playbook to install Malware Information Sharing Platform (MISP)☆17Updated 10 years ago
- Using osquery for Mass Incident Detection & Response☆19Updated 8 years ago
- DNS passive monitoring tool☆16Updated 7 years ago
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Updated last year
- A curated list of tools for incident response☆29Updated last year
- Intrusion Detection System based on Anomaly Detection. Uses the SystemTap dynamic instrumentation framework for the Linux kernel.☆13Updated 13 years ago
- Custom slash command to find all a domains A records from within Slack☆11Updated 9 years ago
- Yara syntax highlighting☆25Updated 3 years ago
- Mass DNS resolution tool☆37Updated 4 years ago
- This repository is a curated list of pro bono incident response entities.☆20Updated last year
- Email Abuse - A Versatile Software for Email review, analysis and reporting☆21Updated 9 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Updated 10 years ago
- An active domain name query tool to help keep track of domain name movements...☆15Updated 4 years ago
- Plugins written for CVE-Search☆25Updated 4 years ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Updated 9 years ago
- Spam Honeypot with Intelligent Virtual Analyzer☆17Updated 11 years ago
- ☆22Updated 5 years ago
- Forensic Dropbox☆21Updated 12 years ago
- cuckoo-1.1 fork with suricata/moloch/clamav and other goodies☆23Updated 10 years ago
- Simple install script for Suricata/Zeek with JSON logging on FreeBSD☆18Updated last month
- PowerShell Utilities for Security Situational Awareness☆12Updated 8 years ago
- Potiron - Normalize, Index and Visualize Network Capture☆85Updated 6 years ago