☆61May 8, 2026Updated this week
Alternatives and similar repositories for securityonion-soc
Users that are interested in securityonion-soc are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆54Apr 28, 2026Updated last week
- ☆95Apr 1, 2026Updated last month
- ☆13Apr 8, 2022Updated 4 years ago
- Scripts to inject demo data and network traffic into an existing Alienvault/OSSIM installation☆21Jul 4, 2017Updated 8 years ago
- ☆17Mar 24, 2026Updated last month
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A PoC backdoor that uses Gmail as a C&C server☆13Jun 28, 2020Updated 5 years ago
- Security Onion is a free and open platform for threat hunting, enterprise security monitoring, and log management. It includes our own in…☆4,602Updated this week
- Docker files for Security Onion☆43Jan 28, 2021Updated 5 years ago
- ☆58Mar 4, 2022Updated 4 years ago
- Collection of walkthroughs on various threat hunting techniques☆77Aug 3, 2020Updated 5 years ago
- ☆12Jan 5, 2021Updated 5 years ago
- Integrate IBM QRadar and RPA to automate security L1 tasks.☆14May 20, 2022Updated 3 years ago
- Node.js SDK for IBM X-Force Exchange☆15Aug 20, 2018Updated 7 years ago
- ☆37Dec 17, 2020Updated 5 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Apr 10, 2020Updated 6 years ago
- Minimal syslog-ng container (8.5mb) that listens for tcp and upd on port 514.☆14Jun 15, 2015Updated 10 years ago
- ☆10Jan 8, 2018Updated 8 years ago
- ☆20Sep 23, 2018Updated 7 years ago
- Example go code demonstrating pprof labels☆17Apr 13, 2021Updated 5 years ago
- Secure Coding in Go☆23Aug 4, 2024Updated last year
- OpenDXL Console is a high-level web-based console for interacting with a DXL fabric☆11Mar 29, 2021Updated 5 years ago
- Kestrel Jupyter Notebook Kernel☆10Oct 19, 2023Updated 2 years ago
- Wazuh - Tools for packages creation☆115Nov 25, 2024Updated last year
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Log generator☆11Updated this week
- Sysmon and wazuh integration with Sigma sysmon rules [updated]☆74Jul 21, 2021Updated 4 years ago
- Network and web related exploratory playground.☆19Apr 6, 2016Updated 10 years ago
- ☆12Dec 7, 2022Updated 3 years ago
- THOR APT Scanner User Manual☆21May 2, 2026Updated last week
- Kafka connector to sync Zed lakes to and from Kafka topics☆18Dec 4, 2025Updated 5 months ago
- Kerberos Haters Guide to Zeek Threat Hunting☆34Oct 14, 2021Updated 4 years ago
- Various tools, scripts, and techniques☆19May 13, 2020Updated 5 years ago
- Tool for managing Zeek deployments.☆61Apr 14, 2026Updated 3 weeks ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science☆152May 1, 2026Updated last week
- Validates Sigma rules using the JSON schema☆22Apr 24, 2026Updated 2 weeks ago
- IBM QRadar Ansible Collection☆25Apr 27, 2026Updated last week
- ☆13Sep 22, 2022Updated 3 years ago
- Wazuh prometheus exporter☆36Jul 4, 2025Updated 10 months ago
- Extracts fields from zeek logs, compatible with zeek-cut☆27Jul 10, 2024Updated last year
- An ecosystem to facilitate real-time remote viewing of ultrasound images (or any other livestreaming application)☆11Feb 12, 2023Updated 3 years ago