StamusNetworks / SELKSLinks
A Suricata based IDS/IPS/NSM distro
☆1,536Updated 9 months ago
Alternatives and similar repositories for SELKS
Users that are interested in SELKS are comparing it to the libraries listed below
Sorting:
- Scirius is a web application for Suricata ruleset management and threat hunting.☆651Updated 2 weeks ago
- Web Based Event Viewer (GUI) for Suricata EVE Events in Elastic Search☆458Updated last week
- Security Onion is a free and open platform for threat hunting, enterprise security monitoring, and log management. It includes our own in…☆3,712Updated last week
- Cortex: a Powerful Observable Analysis and Active Response Engine☆1,429Updated 7 months ago
- Wazuh - Ruleset☆448Updated 8 months ago
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆2,127Updated 2 weeks ago
- Your Everyday Threat Intelligence☆1,860Updated 3 weeks ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,512Updated 10 months ago
- Attack Detection☆1,357Updated 2 years ago
- Suricata, Snort and Zeek IDS rule and pcap testing system☆479Updated last week
- TheHive: a Scalable, Open Source and Free Security Incident Response Platform☆3,672Updated 2 years ago
- The tool for updating your Suricata rules.☆271Updated last month
- Security Onion 16.04 - Linux distro for threat hunting, enterprise security monitoring, and log management☆3,085Updated 4 years ago
- Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine developed by the OIS…☆5,271Updated last week
- Suricata IDS/IPS log analytics using the Elastic Stack.☆238Updated 3 years ago
- Modular and decentralised honeypot☆2,488Updated 2 weeks ago
- Shuffle: A general purpose security automation platform. Our focus is on collaboration and resource sharing.☆1,953Updated this week
- Wazuh - Docker containers☆830Updated this week
- YARA signature and IOC database for my scanners and tools☆2,629Updated last week
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆2,891Updated 11 months ago
- Modern Honey Network☆2,453Updated 6 months ago
- Open Source EDR for Windows☆1,245Updated 2 years ago
- A utility to safely generate malicious network traffic patterns and evaluate controls.☆1,310Updated last year
- Create actionable data from your Vulnerability Scans☆1,380Updated 2 years ago
- Fast Incident Response☆1,881Updated last week
- Loki - Simple IOC and YARA Scanner☆3,543Updated 6 months ago
- Slips, a free software behavioral Python intrusion prevention system (IDS/IPS) that uses machine learning to detect malicious behaviors i…☆777Updated this week
- Indicators of Compromises (IOC) of our various investigations☆1,775Updated last week
- A curated Cyber "Security Orchestration, Automation and Response (SOAR)" awesome list.☆864Updated 9 months ago
- Configuration files for the SOF-ELK VM☆1,590Updated last month