StamusNetworks / KTS7Links
Kibana 7 Templates for Suricata IDPS Threat Hunting
☆42Updated this week
Alternatives and similar repositories for KTS7
Users that are interested in KTS7 are comparing it to the libraries listed below
Sorting:
- Wazuh - Splunk App☆56Updated 11 months ago
- Threat Intelligence with Elastic - Minemeld integration with Elasticsearch☆19Updated 4 years ago
- Sysmon and wazuh integration with Sigma sysmon rules [updated]☆68Updated 4 years ago
- DynamiteNSM is a free Network Security Monitor developed by Dynamite Analytics to enable network visibility and advanced cyber threat det…☆171Updated 2 years ago
- Kibana 6 Templates for Suricata IDPS Threat Hunting☆24Updated 6 years ago
- ☆89Updated 2 weeks ago
- ☆58Updated this week
- Cyber Defence Monitoring Course Suite :: Suricata, Arkime (and others in the past)☆106Updated last year
- An Ansible playbook for deploying the Suricata intrusion detection system and fetching Snort rules with Oinkmaster.☆16Updated 3 years ago
- ☆50Updated last week
- A Ruleset to enhance detection capabilities of Ossec using Sysmon☆94Updated 3 years ago
- Our collection of Wazuh detection rules for our Offense Lab☆15Updated 3 years ago
- Snort IDS/IPS log analytics using the Elastic Stack.☆86Updated 4 years ago
- Run Velociraptor on Security Onion☆39Updated 3 years ago
- Docker configurations for TheHive, Cortex and 3rd party tools☆126Updated 2 years ago
- A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the…☆63Updated 2 years ago
- The OTX Suricata Rule Generator can be used to create the rules and configuration for Suricata to alert on indicators from your OTX accou…☆111Updated last year
- Documentation for Zeek☆50Updated last week
- Parse wazuh[HIDS] alerts into ECS mapping using Filebeat☆27Updated 5 years ago
- PatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform☆149Updated 3 years ago
- SOC Workflow App helps Security Analysts and Threat Hunters explore suspicious events, look into raw events arriving at the Elastic Stack…☆94Updated 3 years ago
- ☆23Updated 6 years ago
- Convert Sigma rules to Wazuh rules☆67Updated last year
- Run zeek with zeekctl in docker☆55Updated 11 months ago
- Threat Hunting with ELK Workshop (InfoSecWorld 2017)☆66Updated 7 years ago
- PcapMonkey will provide an easy way to analyze pcap using the latest version of Suricata and Zeek.☆157Updated 5 months ago
- A Sigma to Wazuh / OSSEC converter including a generated Windows Sysmon ruleset☆33Updated 5 years ago
- Corelight@Home script☆43Updated last year
- SIGMA UI is a free open-source application based on the Elastic stack and Sigma Converter (sigmac)☆189Updated 4 years ago
- ☆53Updated 3 years ago