StamusNetworks / KTS6Links
Kibana 6 Templates for Suricata IDPS Threat Hunting
☆24Updated 6 years ago
Alternatives and similar repositories for KTS6
Users that are interested in KTS6 are comparing it to the libraries listed below
Sorting:
- collector/runner☆65Updated 2 months ago
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆38Updated 3 years ago
- How to send structured Snort IDS alert logs into Graylog☆27Updated last month
- Threat Intelligence with Elastic - Minemeld integration with Elasticsearch☆19Updated 4 years ago
- Vulnerability Assessment Module - OpenVas with Elastic stack using VulnWhisperer☆19Updated 6 years ago
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Updated 5 years ago
- ☆21Updated 5 years ago
- ☆35Updated 4 years ago
- A Yara Lua output script for Suricata☆20Updated 6 years ago
- Wazuh - Splunk App☆56Updated last year
- ansible role to setup MISP, Malware Information Sharing Platform & Threat Sharing☆54Updated this week
- D4 core software (server and sample sensor client)☆42Updated last year
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago
- Cyber Defence Monitoring Course Suite :: Suricata, Arkime (and others in the past)☆107Updated last year
- Docker files for Security Onion☆42Updated 4 years ago
- Parse wazuh[HIDS] alerts into ECS mapping using Filebeat☆28Updated 5 years ago
- brostash: Linux distribution based on Debian and focusing on network security events collection☆34Updated 5 years ago
- Kibana 7 Templates for Suricata IDPS Threat Hunting☆43Updated last week
- Expandable Defensive Cyber Operations Platform☆43Updated 3 years ago
- OwlH Master API Web User Interface☆12Updated last year
- An Ansible playbook for deploying the Suricata intrusion detection system and fetching Snort rules with Oinkmaster.☆17Updated 4 years ago
- RPM packages for MISP☆37Updated last week
- ☆52Updated 3 weeks ago
- ☆12Updated 5 years ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆71Updated 6 years ago
- Bro IDS + ELK Stack to detect and block data exfiltration☆46Updated 7 years ago
- Example configuration files for Logstash☆44Updated 6 years ago
- Add POST body excerpt to Bro's HTTP log☆14Updated last year
- Security Onion Elastic Stack☆46Updated 4 years ago
- Suricata rule and intel index☆33Updated 3 weeks ago