StamusNetworks / KTS7Links
Kibana 7 Templates for Suricata IDPS Threat Hunting
☆43Updated 2 weeks ago
Alternatives and similar repositories for KTS7
Users that are interested in KTS7 are comparing it to the libraries listed below
Sorting:
- Docker configurations for TheHive, Cortex and 3rd party tools☆128Updated 2 years ago
- Kibana 6 Templates for Suricata IDPS Threat Hunting☆24Updated 6 years ago
- Sysmon and wazuh integration with Sigma sysmon rules [updated]☆70Updated 4 years ago
- ☆94Updated this week
- A Ruleset to enhance detection capabilities of Ossec using Sysmon☆94Updated 3 years ago
- ☆52Updated 2 weeks ago
- Wazuh - Splunk App☆56Updated last year
- DynamiteNSM is a free Network Security Monitor developed by Dynamite Analytics to enable network visibility and advanced cyber threat det…☆171Updated 2 years ago
- PatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform☆149Updated 3 years ago
- ☆60Updated last week
- The OTX Suricata Rule Generator can be used to create the rules and configuration for Suricata to alert on indicators from your OTX accou…☆112Updated last year
- Threat Intelligence with Elastic - Minemeld integration with Elasticsearch☆19Updated 4 years ago
- An Ansible playbook for deploying the Suricata intrusion detection system and fetching Snort rules with Oinkmaster.☆17Updated 4 years ago
- Convert Sigma rules to Wazuh rules☆73Updated 3 months ago
- Cyber Defence Monitoring Course Suite :: Suricata, Arkime (and others in the past)☆107Updated last year
- Snort IDS/IPS log analytics using the Elastic Stack.☆87Updated 4 years ago
- A website and framework for testing NIDS detection☆57Updated 4 years ago
- A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the…☆63Updated 3 weeks ago
- PcapMonkey will provide an easy way to analyze pcap using the latest version of Suricata and Zeek.☆159Updated 8 months ago
- Wazuh integration TheHive☆40Updated 2 years ago
- Suricata rules for network anomaly detection☆180Updated 2 weeks ago
- Example Suricata rules implementing some of my detection tactics☆22Updated 2 years ago
- ☆23Updated 6 years ago
- Parse wazuh[HIDS] alerts into ECS mapping using Filebeat☆28Updated 5 years ago
- RPM packages for MISP☆38Updated this week
- Apps to be used for Shuffle automation. Most of Shuffle's apps (2500+) are generated from APIs, and available in the search engine below:☆120Updated last week
- The Project can be used to integrate QRadar with MISP Threat Sharing Platform☆40Updated 3 years ago
- ☆56Updated 3 years ago
- The PCAP Analyzer for Splunk includes useful Dashboards to analyze network packet capture files from Wireshark or Network Monitor (.pcap)…☆44Updated last year
- Threat Hunting with ELK Workshop (InfoSecWorld 2017)☆65Updated 8 years ago