☆54Mar 17, 2026Updated last week
Alternatives and similar repositories for securityonion-image
Users that are interested in securityonion-image are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆61Updated this week
- ☆95Mar 16, 2026Updated last week
- ☆13Apr 8, 2022Updated 3 years ago
- Another Portable Executable files analysing stuff☆21May 28, 2011Updated 14 years ago
- Build Automated Machine Images for MISP☆29Jun 9, 2023Updated 2 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- ☆33Jun 27, 2022Updated 3 years ago
- Scripts written in BASH, PowerShell, Python, and other languages.☆10Aug 5, 2023Updated 2 years ago
- Security Onion is a free and open platform for threat hunting, enterprise security monitoring, and log management. It includes our own in…☆4,505Updated this week
- Web-based sensor management suite☆20Mar 2, 2023Updated 3 years ago
- A small crappy script I wrote that converts the Sigma Windows Process Creation events to KQL via PySigma. Designed for CI/CD☆10Nov 7, 2023Updated 2 years ago
- Docker templates for unRAID☆11Mar 23, 2026Updated last week
- Classic Bofa adapted to CobaltStrike.☆11Oct 4, 2022Updated 3 years ago
- FSL Test bench - Ansible playbook repository to setup a save environment for security auditing and testing. It can be used for teaching s…☆30Nov 26, 2024Updated last year
- My Notes from Hugging Face AI Agents Course☆20Feb 18, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Apr 10, 2020Updated 5 years ago
- Scripts to threat optics stack quickly / abbreviated and automated. Run after APT-Lab-Terraform☆13Oct 24, 2020Updated 5 years ago
- Docker configurations for TheHive, Cortex and 3rd party tools☆129Jan 9, 2023Updated 3 years ago
- A collection of Splunk dashboard templates.☆15Apr 18, 2019Updated 6 years ago
- My conky configuration + scripts.☆12Jul 2, 2017Updated 8 years ago
- Validates username & password combination(s) across a host or group of hosts using the SMB protocol.☆15Apr 6, 2020Updated 5 years ago
- Assorted classes and methods for indexing reports and retrieving information from an elastic index☆21Jul 5, 2016Updated 9 years ago
- Wazuh - Tools for packages creation☆113Nov 25, 2024Updated last year
- A collection of Security Bookmarks☆11Oct 9, 2021Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Scrapes information on vulnerabilities from US-CERT and parses them for further usage☆17Jun 23, 2020Updated 5 years ago
- An Intro to Penetration Testing Workshop☆15May 31, 2018Updated 7 years ago
- The eMASS client repository maintains the Enterprise Mission Assurance Support Service (eMASS) Representational State Transfer (REST) App…☆26Oct 21, 2025Updated 5 months ago
- Zeek-Formatted Threat Intelligence Feeds☆392Updated this week
- ☆54May 14, 2024Updated last year
- ☆12Dec 7, 2022Updated 3 years ago
- 🗡️ A multi-user malleable C2 framework targeting Windows. Written in C++ and Python☆45Feb 6, 2026Updated last month
- The repository contains Criminal IP Asset Search data in STIX 2.1 JSON format, enabling a quick understanding of threat information for s…☆12Jan 29, 2024Updated 2 years ago
- Kerberos Haters Guide to Zeek Threat Hunting☆35Oct 14, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Kafka connector to sync Zed lakes to and from Kafka topics☆18Dec 4, 2025Updated 3 months ago
- Tool for managing Zeek deployments.☆60Mar 12, 2026Updated 2 weeks ago
- Various tools, scripts, and techniques☆19May 13, 2020Updated 5 years ago
- Presentations from Conferences☆31Sep 14, 2024Updated last year
- Primary data pipelines for intrusion detection, security analytics and threat hunting☆85Jan 9, 2022Updated 4 years ago
- pure Python binary analysis framework☆23Oct 26, 2018Updated 7 years ago
- Check IOC provided by a MISP instance on Suricata events☆18Jun 4, 2019Updated 6 years ago