☆54Apr 10, 2026Updated last week
Alternatives and similar repositories for securityonion-image
Users that are interested in securityonion-image are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆61Apr 10, 2026Updated last week
- ☆95Apr 1, 2026Updated 2 weeks ago
- ☆13Apr 8, 2022Updated 4 years ago
- Build Automated Machine Images for MISP☆29Jun 9, 2023Updated 2 years ago
- ☆33Jun 27, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Web-based sensor management suite☆20Mar 2, 2023Updated 3 years ago
- A small crappy script I wrote that converts the Sigma Windows Process Creation events to KQL via PySigma. Designed for CI/CD☆10Nov 7, 2023Updated 2 years ago
- Docker templates for unRAID☆11Apr 13, 2026Updated last week
- ☆17Mar 24, 2026Updated 3 weeks ago
- Sysmon Tools for PowerShell☆12Aug 17, 2018Updated 7 years ago
- FSL Test bench - Ansible playbook repository to setup a save environment for security auditing and testing. It can be used for teaching s…☆30Nov 26, 2024Updated last year
- ☆21Apr 30, 2020Updated 5 years ago
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Apr 10, 2020Updated 6 years ago
- My Notes from Hugging Face AI Agents Course☆19Feb 18, 2025Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Docker configurations for TheHive, Cortex and 3rd party tools☆129Jan 9, 2023Updated 3 years ago
- A collection of Splunk dashboard templates.☆15Apr 18, 2019Updated 7 years ago
- Cyber Threat Intelligence Appliance☆13Dec 8, 2022Updated 3 years ago
- My conky configuration + scripts.☆12Jul 2, 2017Updated 8 years ago
- Validates username & password combination(s) across a host or group of hosts using the SMB protocol.☆15Apr 6, 2020Updated 6 years ago
- A lightweight, powerful, local-first prompt management system that brings version control, dynamic templating, and a visual studio interf…☆25Mar 30, 2026Updated 2 weeks ago
- Splunk Searches and Dashboards for DNS Threat Hunting☆11Mar 5, 2018Updated 8 years ago
- Technical add-on for Splunk related to TheHive/Cortex from TheHive project☆54Mar 21, 2026Updated 3 weeks ago
- A Splunk app that will rotate between dashboards on a frequency; useful for displaying content on informational big screens.☆13Mar 9, 2022Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A collection of Security Bookmarks☆11Oct 9, 2021Updated 4 years ago
- Scrapes information on vulnerabilities from US-CERT and parses them for further usage☆17Jun 23, 2020Updated 5 years ago
- An Intro to Penetration Testing Workshop☆15May 31, 2018Updated 7 years ago
- The eMASS client repository maintains the Enterprise Mission Assurance Support Service (eMASS) Representational State Transfer (REST) App…☆27Mar 31, 2026Updated 2 weeks ago
- Zeek-Formatted Threat Intelligence Feeds☆394Updated this week
- ☆54May 14, 2024Updated last year
- ☆12Dec 7, 2022Updated 3 years ago
- Kafka connector to sync Zed lakes to and from Kafka topics☆18Dec 4, 2025Updated 4 months ago
- Kerberos Haters Guide to Zeek Threat Hunting☆34Oct 14, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Various tools, scripts, and techniques☆19May 13, 2020Updated 5 years ago
- Tool for managing Zeek deployments.☆60Updated this week
- Presentations from Conferences☆31Sep 14, 2024Updated last year
- Primary data pipelines for intrusion detection, security analytics and threat hunting☆85Jan 9, 2022Updated 4 years ago
- pure Python binary analysis framework☆23Oct 26, 2018Updated 7 years ago
- Steve McCanne's Sharkfest '21 Talk☆16Oct 12, 2021Updated 4 years ago
- Validates Sigma rules using the JSON schema☆22Mar 18, 2024Updated 2 years ago