Security-Onion-Solutions / securityonion-imageLinks
☆48Updated 2 weeks ago
Alternatives and similar repositories for securityonion-image
Users that are interested in securityonion-image are comparing it to the libraries listed below
Sorting:
- ☆54Updated this week
- ☆35Updated 4 years ago
- OSSEM Common Data Model☆55Updated 2 years ago
- Parse wazuh[HIDS] alerts into ECS mapping using Filebeat☆27Updated 4 years ago
- Provides detection capabilities and log conversion to evtx or syslog capabilities☆53Updated 2 years ago
- Run Velociraptor on Security Onion☆38Updated 2 years ago
- ☆89Updated this week
- Workflows for Shuffle☆23Updated 2 years ago
- ☆77Updated 5 years ago
- A community event for security researchers to share their favorite notebooks☆107Updated last year
- OSSEM Data Dictionaries☆61Updated 5 months ago
- ☆54Updated 4 years ago
- Cerebrate is an open-source platform meant to act as a trusted contact information provider and interconnection orchestrator for other se…☆88Updated this week
- ☆51Updated 3 years ago
- ☆34Updated 4 years ago
- Collects a listing of MITRE ATT&CK Techniques, then discovers Splunk ESCU detections for each technique☆67Updated last year
- A collection of notebooks built for defensive and offensive operations.☆77Updated 4 years ago
- The Infosec Community Definitive Guide to Jupyter Notebooks☆122Updated 4 years ago
- Convert Sigma rules to LogRhythm searches☆21Updated 3 years ago
- Technical add-on for Splunk related to TheHive/Cortex from TheHive project☆53Updated 2 months ago
- SIEGMA - Transform Sigma rules into SIEM consumables☆151Updated 3 months ago
- The Project can be used to integrate QRadar with MISP Threat Sharing Platform☆39Updated 3 years ago
- Mapping your datasources and detections to the MITRE ATT&CK Navigator framework.☆58Updated 5 years ago
- Convert Sigma rules to Wazuh rules☆67Updated last year
- Notes on managing and coordinating the response to major cyber incidents☆40Updated 5 years ago
- A CALDERA plugin☆77Updated 2 weeks ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆44Updated last year
- A Splunk App containing Sigma detection rules, which can be updated from a Git repository.☆110Updated 5 years ago
- Actionable analytics designed to combat threats based on MITRE's ATT&CK.☆22Updated 5 years ago
- A collection of tips for using MISP.☆74Updated 6 months ago