StamusNetworks / KTS7
Kibana 7 Templates for Suricata IDPS Threat Hunting
☆40Updated 2 years ago
Alternatives and similar repositories for KTS7:
Users that are interested in KTS7 are comparing it to the libraries listed below
- ☆48Updated this week
- Run Velociraptor on Security Onion☆37Updated 2 years ago
- Sysmon and wazuh integration with Sigma sysmon rules [updated]☆65Updated 3 years ago
- ☆35Updated 4 years ago
- Convert Sigma rules to Wazuh rules☆64Updated last year
- Our collection of Wazuh detection rules for our Offense Lab☆14Updated 3 years ago
- Cyber Defence Monitoring Course Suite :: Suricata, Arkime (and others in the past)☆104Updated 11 months ago
- The OTX Suricata Rule Generator can be used to create the rules and configuration for Suricata to alert on indicators from your OTX accou…☆110Updated last year
- ☆53Updated this week
- A website and framework for testing NIDS detection☆57Updated 3 years ago
- Wazuh - Splunk App☆53Updated 7 months ago
- A Splunk App containing Sigma detection rules, which can be updated from a Git repository.☆109Updated 5 years ago
- A Ruleset to enhance detection capabilities of Ossec using Sysmon☆92Updated 3 years ago
- Tool for managing Zeek deployments.☆56Updated 2 weeks ago
- Synapse: a Meta Alert Feeder for TheHive, a Security Incident Response Platform☆71Updated last year
- Collection of walkthroughs on various threat hunting techniques☆75Updated 4 years ago
- Threat Intelligence with Elastic - Minemeld integration with Elasticsearch☆19Updated 3 years ago
- automate your MISP installs☆68Updated 4 years ago
- Threat Hunting with ELK Workshop (InfoSecWorld 2017)☆66Updated 7 years ago
- Threat Detection & Anomaly Detection rules for popular open-source components☆51Updated 2 years ago
- SOC Workflow App helps Security Analysts and Threat Hunters explore suspicious events, look into raw events arriving at the Elastic Stack…☆94Updated 2 years ago
- A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the…☆63Updated 2 years ago
- The FASTEST way to consume threat intel.☆68Updated last year
- S2AN - Mapper of Sigma/Suricata Rules/Signatures ➡️ MITRE ATT&CK Navigator☆85Updated 2 years ago
- Snort IDS/IPS log analytics using the Elastic Stack.☆86Updated 3 years ago
- An Ansible playbook for deploying the Suricata intrusion detection system and fetching Snort rules with Oinkmaster.☆15Updated 3 years ago
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆95Updated 3 years ago
- collector/runner☆65Updated last month
- Documentation for Zeek☆50Updated this week
- The Project can be used to integrate QRadar with MISP Threat Sharing Platform☆39Updated 2 years ago