Kibana 5 Templates for Suricata IDPS
☆43May 30, 2018Updated 7 years ago
Alternatives and similar repositories for KTS5
Users that are interested in KTS5 are comparing it to the libraries listed below
Sorting:
- Kibana 4 Templates for Suricata IDPS☆33Jul 28, 2016Updated 9 years ago
- Hakabana monitoring tool using Haka, ElastcSearch and Kibana☆20Sep 24, 2014Updated 11 years ago
- Kibana 6 Templates for Suricata IDPS Threat Hunting☆24Mar 5, 2019Updated 7 years ago
- Remotely Triggered Black Hole Configurations☆13Jan 12, 2017Updated 9 years ago
- Simple Ansible role and playbook to harden a Mikrotik RouterOS device☆13Jul 26, 2019Updated 6 years ago
- An informational repo about hunting for adversaries in your IT environment.☆14Apr 10, 2017Updated 8 years ago
- Mass Suricata rules creator, from a list of domain☆14Sep 14, 2018Updated 7 years ago
- Easy way to install OpenWRT on Mikrotik RB951 device using Ansible and Vagrant☆13Feb 9, 2016Updated 10 years ago
- Application and service identification rules for Suricata☆19Nov 7, 2022Updated 3 years ago
- suricata IDS的规则,测试在用的,部分自写的规则视情况放出。☆18Apr 16, 2019Updated 6 years ago
- Templates for Kibana/Logstash to use with Suricata IDPS☆81Mar 12, 2016Updated 9 years ago
- A Yara Lua output script for Suricata☆20Apr 7, 2019Updated 6 years ago
- Web Based Event Viewer (GUI) for Suricata EVE Events in Elastic Search☆484Feb 19, 2026Updated 2 weeks ago
- Example Suricata rules implementing some of my detection tactics☆22Jan 13, 2023Updated 3 years ago
- The tool for updating your Suricata rules.☆293Oct 31, 2025Updated 4 months ago
- Automatic backup Mikrotik router via ssh☆26Jul 2, 2015Updated 10 years ago
- Script to install a Postfix/Dovecot/Mysql system and the postfixadmin web UI☆29Jun 28, 2020Updated 5 years ago
- GPG Mail Gateway for Postfix fork☆52Nov 3, 2013Updated 12 years ago
- Scirius is a web application for Suricata ruleset management and threat hunting.☆675Dec 23, 2025Updated 2 months ago
- Collection of handy Mikrotik Scripts☆25Jul 2, 2019Updated 6 years ago
- Quickly generate suricata rules for IOCs☆28Apr 30, 2021Updated 4 years ago
- Docker based Suricata, Elasticsearch, Logstash, Kibana, Scirius aka SELKS☆184Sep 13, 2022Updated 3 years ago
- Zero Touch Provisioning on Mikrotik☆31Oct 13, 2018Updated 7 years ago
- Chef cookbook example to install and configure a mail server using Postfix, Dovecot, PostfixAdmin and SpamAssassin.☆67Aug 29, 2017Updated 8 years ago
- A Content Pack for Graylog2 which supports more flexible streaming of logs from nginx☆28Feb 8, 2018Updated 8 years ago
- Samsung Galaxy A52s 5G (a52sxq) TWRP Device Tree.☆12Jan 27, 2024Updated 2 years ago
- This is a bash script used for ISPConfig 3 server migrations☆15Sep 13, 2016Updated 9 years ago
- TLS scanning component of OWASP PurpleTeam☆11Feb 8, 2023Updated 3 years ago
- DragonJAR Automatic Windows Forensic☆13May 23, 2017Updated 8 years ago
- A few snippets to show how suricata stats can end up in Influx DB using logstash☆12Jul 11, 2016Updated 9 years ago
- The Express Middleware for Oracle PL/SQL☆12Feb 26, 2026Updated last week
- ☆12Aug 1, 2025Updated 7 months ago
- Palo Alto Networks AI Runtime Security Model Context Protocol (MCP) Relay Server☆31Jan 27, 2026Updated last month
- Threat Response API Module☆10Oct 4, 2023Updated 2 years ago
- Click script for KanColle (艦これ) expeditions written in AHK☆11Dec 16, 2017Updated 8 years ago
- Fathimah bot Telegram support plugins.☆13Aug 19, 2017Updated 8 years ago
- Scripts that cover the basics of interacting with the Threat Grid API☆11Jan 21, 2020Updated 6 years ago
- Tool that displays the maximum HP Anyware license concurrent usage over time☆10Feb 11, 2026Updated 3 weeks ago
- Trait-based testing library for Grails framework☆10Oct 11, 2025Updated 4 months ago