Security-Onion-Solutions / securityonion-socLinks
☆55Updated this week
Alternatives and similar repositories for securityonion-soc
Users that are interested in securityonion-soc are comparing it to the libraries listed below
Sorting:
- ☆48Updated last week
- ☆89Updated this week
- Pathfinder is a plugin for mapping network vulnerabilities, scanned by CALDERA or imported by a supported network scanner, and translatin…☆126Updated 4 months ago
- Sysmon and wazuh integration with Sigma sysmon rules [updated]☆68Updated 4 years ago
- ☆51Updated 3 years ago
- Fast IOC and YARA Scanner☆81Updated 5 years ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆71Updated 2 years ago
- A Ruleset to enhance detection capabilities of Ossec using Sysmon☆94Updated 3 years ago
- Docker configurations for TheHive, Cortex and 3rd party tools☆126Updated 2 years ago
- OpenCTI Docker deployment helpers☆198Updated this week
- Run Velociraptor on Security Onion☆39Updated 3 years ago
- Collection of walkthroughs on various threat hunting techniques☆75Updated 5 years ago
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆35Updated 2 years ago
- A MITRE Caldera plugin☆45Updated 8 months ago
- OSSEM Common Data Model☆56Updated 2 years ago
- Wazuh integration TheHive☆38Updated 2 years ago
- PcapMonkey will provide an easy way to analyze pcap using the latest version of Suricata and Zeek.☆156Updated 4 months ago
- A CALDERA plugin☆77Updated last week
- ☆36Updated 4 years ago
- Suricata Language Server is an implementation of the Language Server Protocol for Suricata signatures. It adds syntax check, hints and au…☆79Updated last month
- Convert Sigma rules to Wazuh rules☆67Updated last year
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆65Updated last year
- A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the…☆62Updated 2 years ago
- an awesome list of active defense resources☆124Updated 5 years ago
- The Infosec Community Definitive Guide to Jupyter Notebooks☆122Updated 4 years ago
- Collection of Dashboards for Threat Hunting and more!☆68Updated 4 years ago
- Attack Range to test detection against nativel serverless cloud services and environments☆35Updated 3 years ago
- S2AN - Mapper of Sigma/Suricata Rules/Signatures ➡️ MITRE ATT&CK Navigator☆87Updated 2 years ago
- Security Onion + Automation + Response Lab including n8n and Velociraptor☆111Updated 2 years ago
- A Sigma to Wazuh / OSSEC converter including a generated Windows Sysmon ruleset☆33Updated 5 years ago