StamusNetworks / KTS7Links
Kibana 7 Templates for Suricata IDPS Threat Hunting
☆43Updated last month
Alternatives and similar repositories for KTS7
Users that are interested in KTS7 are comparing it to the libraries listed below
Sorting:
- Wazuh - Splunk App☆56Updated last year
- Parse wazuh[HIDS] alerts into ECS mapping using Filebeat☆28Updated 5 years ago
- Threat Intelligence with Elastic - Minemeld integration with Elasticsearch☆19Updated 4 years ago
- ☆52Updated last week
- Sysmon and wazuh integration with Sigma sysmon rules [updated]☆70Updated 4 years ago
- Docker configurations for TheHive, Cortex and 3rd party tools☆126Updated 2 years ago
- DynamiteNSM is a free Network Security Monitor developed by Dynamite Analytics to enable network visibility and advanced cyber threat det…☆171Updated 2 years ago
- ☆91Updated last week
- Kibana 6 Templates for Suricata IDPS Threat Hunting☆24Updated 6 years ago
- A Ruleset to enhance detection capabilities of Ossec using Sysmon☆95Updated 3 years ago
- Cyber Defence Monitoring Course Suite :: Suricata, Arkime (and others in the past)☆107Updated last year
- Snort IDS/IPS log analytics using the Elastic Stack.☆87Updated 4 years ago
- Suricata rules for network anomaly detection☆173Updated last week
- The Project can be used to integrate QRadar with MISP Threat Sharing Platform☆40Updated 3 years ago
- The OTX Suricata Rule Generator can be used to create the rules and configuration for Suricata to alert on indicators from your OTX accou…☆111Updated last year
- Run Velociraptor on Security Onion☆40Updated 3 years ago
- ansible role to setup MISP, Malware Information Sharing Platform & Threat Sharing☆54Updated 2 weeks ago
- A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the…☆63Updated 2 years ago
- ☆60Updated last week
- PatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform☆149Updated 3 years ago
- SOC Workflow App helps Security Analysts and Threat Hunters explore suspicious events, look into raw events arriving at the Elastic Stack…☆94Updated 3 years ago
- A Sigma to Wazuh / OSSEC converter including a generated Windows Sysmon ruleset☆34Updated 5 years ago
- An Ansible playbook for deploying the Suricata intrusion detection system and fetching Snort rules with Oinkmaster.☆17Updated 3 years ago
- Run zeek with zeekctl in docker☆55Updated last year
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆37Updated 3 years ago
- PcapMonkey will provide an easy way to analyze pcap using the latest version of Suricata and Zeek.☆158Updated 6 months ago
- A website and framework for testing NIDS detection☆57Updated 4 years ago
- 🚌 Threat Bus – A threat intelligence dissemination layer for open-source security tools.☆264Updated 2 years ago
- Convert Sigma rules to Wazuh rules☆73Updated last month
- ☆36Updated 4 years ago