Security-Onion-Solutions / securityonion-imageLinks
☆48Updated this week
Alternatives and similar repositories for securityonion-image
Users that are interested in securityonion-image are comparing it to the libraries listed below
Sorting:
- ☆55Updated this week
- ☆89Updated last week
- Parse wazuh[HIDS] alerts into ECS mapping using Filebeat☆27Updated 4 years ago
- Documentation for Zeek☆50Updated this week
- OSSEM Common Data Model☆56Updated 2 years ago
- ☆36Updated 4 years ago
- ansible role to setup MISP, Malware Information Sharing Platform & Threat Sharing☆54Updated last week
- Incident Response Network Tools☆24Updated 3 years ago
- Docker configurations for TheHive, Cortex and 3rd party tools☆126Updated 2 years ago
- Search a filesystem for indicators of compromise (IoC).☆74Updated 3 weeks ago
- Workflows for Shuffle☆23Updated 2 years ago
- ☆29Updated 4 years ago
- Caldera plugin to deploy "humans" to emulate user behavior on systems☆28Updated last year
- A collection of notebooks built for defensive and offensive operations.☆77Updated 4 years ago
- Sysmon and wazuh integration with Sigma sysmon rules [updated]☆67Updated 3 years ago
- A curated list of awesome things related to TheHive & Cortex☆180Updated 3 years ago
- Scripts to inject demo data and network traffic into an existing Alienvault/OSSIM installation☆21Updated 8 years ago
- Kibana 7 Templates for Suricata IDPS Threat Hunting☆41Updated 2 years ago
- A CALDERA plugin☆77Updated this week
- Elastic TIP is a python tool which automates the process of aggregating Threat Intelligence and ingesting the intelligence into a common …☆27Updated 11 months ago
- Threat Intelligence with Elastic - Minemeld integration with Elasticsearch☆19Updated 4 years ago
- Provides detection capabilities and log conversion to evtx or syslog capabilities☆54Updated 3 years ago
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Updated 5 years ago
- Run Velociraptor on Security Onion☆38Updated 2 years ago
- OSSEM Data Dictionaries☆61Updated 5 months ago
- An Ansible playbook for deploying the Suricata intrusion detection system and fetching Snort rules with Oinkmaster.☆16Updated 3 years ago
- Convert Sigma rules to Wazuh rules☆67Updated last year
- Best practices in threat intelligence☆47Updated 2 years ago
- Mapping your datasources and detections to the MITRE ATT&CK Navigator framework.☆58Updated 5 years ago
- Zeek Extension to Collect Metadata for Profiling of Endpoints and Proxies☆34Updated last year