StamusNetworks / KTS7Links
Kibana 7 Templates for Suricata IDPS Threat Hunting
☆43Updated 2 weeks ago
Alternatives and similar repositories for KTS7
Users that are interested in KTS7 are comparing it to the libraries listed below
Sorting:
- DynamiteNSM is a free Network Security Monitor developed by Dynamite Analytics to enable network visibility and advanced cyber threat det…☆171Updated 2 years ago
- Kibana 6 Templates for Suricata IDPS Threat Hunting☆24Updated 6 years ago
- Wazuh - Splunk App☆56Updated last year
- The OTX Suricata Rule Generator can be used to create the rules and configuration for Suricata to alert on indicators from your OTX accou…☆111Updated last year
- Threat Intelligence with Elastic - Minemeld integration with Elasticsearch☆19Updated 4 years ago
- ☆51Updated last week
- Sysmon and wazuh integration with Sigma sysmon rules [updated]☆70Updated 4 years ago
- Cyber Defence Monitoring Course Suite :: Suricata, Arkime (and others in the past)☆106Updated last year
- Parse wazuh[HIDS] alerts into ECS mapping using Filebeat☆28Updated 5 years ago
- An Ansible playbook for deploying the Suricata intrusion detection system and fetching Snort rules with Oinkmaster.☆17Updated 3 years ago
- A website and framework for testing NIDS detection☆57Updated 4 years ago
- ☆23Updated 6 years ago
- PatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform☆149Updated 3 years ago
- ☆90Updated last week
- Sagan is a multi-threads, high performance log analysis engine. At it's core, Sagan similar to Suricata/Snort but with logs rather th…☆188Updated 2 weeks ago
- SOC Workflow App helps Security Analysts and Threat Hunters explore suspicious events, look into raw events arriving at the Elastic Stack…☆94Updated 3 years ago
- Snort IDS/IPS log analytics using the Elastic Stack.☆86Updated 4 years ago
- A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the…☆63Updated 2 years ago
- A Ruleset to enhance detection capabilities of Ossec using Sysmon☆95Updated 3 years ago
- Convert Sigma rules to Wazuh rules☆72Updated 2 weeks ago
- Docker configurations for TheHive, Cortex and 3rd party tools☆126Updated 2 years ago
- OwlH Master API☆24Updated 5 months ago
- Synapse: a Meta Alert Feeder for TheHive, a Security Incident Response Platform☆71Updated 2 years ago
- ☆36Updated 4 years ago
- Threat Hunting with ELK Workshop (InfoSecWorld 2017)☆66Updated 7 years ago
- Run Velociraptor on Security Onion☆40Updated 3 years ago
- ansible role to setup MISP, Malware Information Sharing Platform & Threat Sharing☆54Updated this week
- 🚌 Threat Bus – A threat intelligence dissemination layer for open-source security tools.☆264Updated 2 years ago
- ☆58Updated this week
- Suricata Language Server is an implementation of the Language Server Protocol for Suricata signatures. It adds syntax check, hints and au…☆79Updated 3 months ago