Security-Onion-Solutions / securityonion-soc
☆52Updated this week
Alternatives and similar repositories for securityonion-soc:
Users that are interested in securityonion-soc are comparing it to the libraries listed below
- ☆19Updated 3 years ago
- ☆88Updated this week
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆71Updated last year
- Run Velociraptor on Security Onion☆37Updated 2 years ago
- Sysmon and wazuh integration with Sigma sysmon rules [updated]☆64Updated 3 years ago
- Collection of walkthroughs on various threat hunting techniques☆75Updated 4 years ago
- Fast IOC and YARA Scanner☆77Updated 4 years ago
- A MITRE Caldera plugin☆42Updated 4 months ago
- Threat Detection & Anomaly Detection rules for popular open-source components☆51Updated 2 years ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆106Updated 2 years ago
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆62Updated 11 months ago
- A collection of tips for using MISP.☆74Updated 3 months ago
- A Ruleset to enhance detection capabilities of Ossec using Sysmon☆91Updated 2 years ago
- Pathfinder is a plugin for mapping network vulnerabilities, scanned by CALDERA or imported by a supported network scanner, and translatin…☆126Updated 10 months ago
- ☆41Updated 2 years ago
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆34Updated 2 years ago
- A CALDERA plugin☆75Updated last week
- ☆48Updated this week
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆25Updated this week
- ☆51Updated 3 years ago
- Repository for SPEED SIEM Use Case Framework☆53Updated 4 years ago
- Library of threat hunts to get any user started!☆42Updated 4 years ago
- Open IOC sharing platform☆56Updated 4 months ago
- Collects a listing of MITRE ATT&CK Techniques, then discovers Splunk ESCU detections for each technique☆66Updated last year
- Import CrowdStrike Threat Intelligence into your instance of MISP☆44Updated last week
- A collection of Sigma rules organized by MITRE ATT&CK technique☆17Updated 3 years ago
- ☆34Updated 4 years ago
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆26Updated last week
- A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the…☆61Updated 2 years ago
- Awesome Splunk SPL hunt queries that can be used to detect the latest vulnerability exploitation attempts & subsequent compromise☆61Updated 10 months ago