StamusNetworks / KTS7
Kibana 7 Templates for Suricata IDPS Threat Hunting
☆38Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for KTS7
- Threat Intelligence with Elastic - Minemeld integration with Elasticsearch☆19Updated 3 years ago
- ☆47Updated last week
- Wazuh - Splunk App☆50Updated last month
- Parse wazuh[HIDS] alerts into ECS mapping using Filebeat☆27Updated 4 years ago
- ☆46Updated this week
- Cyber Defence Monitoring Course Suite :: Suricata, Arkime (and others in the past)☆100Updated 5 months ago
- ansible role to setup MISP, Malware Information Sharing Platform & Threat Sharing☆52Updated this week
- Convert Sigma rules to Wazuh rules☆56Updated 6 months ago
- Run Velociraptor on Security Onion☆34Updated 2 years ago
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆35Updated 2 years ago
- ☆34Updated 3 years ago
- automate your MISP installs☆66Updated 4 years ago
- An Ansible playbook for deploying the Suricata intrusion detection system and fetching Snort rules with Oinkmaster.☆15Updated 3 years ago
- RPM packages for MISP☆34Updated 2 weeks ago
- Threat Hunting with ELK Workshop (InfoSecWorld 2017)☆66Updated 7 years ago
- A Sigma to Wazuh / OSSEC converter including a generated Windows Sysmon ruleset☆33Updated 4 years ago
- Sysmon and wazuh integration with Sigma sysmon rules [updated]☆61Updated 3 years ago
- ☆46Updated 2 years ago
- Kibana 6 Templates for Suricata IDPS Threat Hunting☆25Updated 5 years ago
- Example Suricata rules implementing some of my detection tactics☆20Updated last year
- Elastic TIP is a python tool which automates the process of aggregating Threat Intelligence and ingesting the intelligence into a common …☆27Updated 3 months ago
- Threat Detection & Anomaly Detection rules for popular open-source components☆50Updated 2 years ago
- Tool for managing Zeek deployments.☆53Updated 3 months ago
- A Splunk App containing Sigma detection rules, which can be updated from a Git repository.☆107Updated 4 years ago
- A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the…☆61Updated 2 years ago
- Bro script package to create JSON formatted logs to stream into data analysis systems.☆28Updated 11 months ago
- Docker configurations for TheHive, Cortex and 3rd party tools☆113Updated last year
- SOC Workflow App helps Security Analysts and Threat Hunters explore suspicious events, look into raw events arriving at the Elastic Stack…☆92Updated 2 years ago
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆60Updated 7 months ago