StamusNetworks / KTS6Links
Kibana 6 Templates for Suricata IDPS Threat Hunting
☆24Updated 6 years ago
Alternatives and similar repositories for KTS6
Users that are interested in KTS6 are comparing it to the libraries listed below
Sorting:
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆38Updated 3 years ago
- ☆21Updated 5 years ago
- collector/runner☆64Updated 4 months ago
- Threat Intelligence with Elastic - Minemeld integration with Elasticsearch☆19Updated 4 years ago
- ansible role to setup MISP, Malware Information Sharing Platform & Threat Sharing☆55Updated last week
- A Yara Lua output script for Suricata☆20Updated 6 years ago
- How to send structured Snort IDS alert logs into Graylog☆27Updated 3 months ago
- Cyber Defence Monitoring Course Suite :: Suricata, Arkime (and others in the past)☆108Updated last year
- RPM packages for MISP☆39Updated 2 weeks ago
- A lightweight tool to score network traffic and flag anomalies☆123Updated last year
- Vulnerability Assessment Module - OpenVas with Elastic stack using VulnWhisperer☆19Updated 6 years ago
- brostash: Linux distribution based on Debian and focusing on network security events collection☆33Updated 5 years ago
- Parse wazuh[HIDS] alerts into ECS mapping using Filebeat☆28Updated 5 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 5 years ago
- Threat Hunting with ELK Workshop (InfoSecWorld 2017)☆65Updated 8 years ago
- Kibana 7 Templates for Suricata IDPS Threat Hunting☆43Updated last month
- Suricata rule and intel index☆33Updated 3 weeks ago
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Updated 5 years ago
- Bro IDS + ELK Stack to detect and block data exfiltration☆46Updated 7 years ago
- ☆13Updated 6 years ago
- Zeek package for tracking long connections to report them before they have completed.☆31Updated 2 months ago
- ioc2rpz is a place where threat intelligence meets DNS.☆112Updated last year
- Wazuh - Splunk App☆56Updated last year
- ☆35Updated 4 years ago
- Triage automation for suspect URLs☆13Updated 6 years ago
- Security Onion Elastic Stack☆46Updated 5 years ago
- The PCAP Analyzer for Splunk includes useful Dashboards to analyze network packet capture files from Wireshark or Network Monitor (.pcap)☆46Updated last month
- SOC Workflow App helps Security Analysts and Threat Hunters explore suspicious events, look into raw events arriving at the Elastic Stack…☆94Updated 3 years ago
- This project is no longer maintained. There's a successor at https://github.com/zeek-packages/zeek-agent-v2☆14Updated 5 years ago
- Expandable Defensive Cyber Operations Platform☆43Updated 3 years ago