Truvis / Splunk_TA_Truvis_Suricata5Links
This TA takes Suricata5 data from your port mirrored Suricata server and makes it readable within Splunk. See Cheatsheets on how to setup a Suricata Port Mirrored Server
☆15Updated 4 years ago
Alternatives and similar repositories for Splunk_TA_Truvis_Suricata5
Users that are interested in Splunk_TA_Truvis_Suricata5 are comparing it to the libraries listed below
Sorting:
- Downloading Splunk, made easy through scripts☆20Updated 4 months ago
- Corelight-Ansible-Roles are a collection of Ansible Roles and playbooks that install, configure, run and manage a variety of Corelight, S…☆16Updated 4 years ago
- Corelight@Home script☆42Updated last year
- An Ansible playbook for deploying the Suricata intrusion detection system and fetching Snort rules with Oinkmaster.☆16Updated 3 years ago
- Run zeek with zeekctl in docker☆51Updated 10 months ago
- Run Velociraptor on Security Onion☆38Updated 2 years ago
- Collection of Dashboards for Threat Hunting and more!☆68Updated 4 years ago
- Elastic Beat for fetching and shipping Office 365 audit events☆67Updated 4 years ago
- A community event for security researchers to share their favorite notebooks☆108Updated last year
- Technical add-on for Splunk related to TheHive/Cortex from TheHive project☆53Updated 3 weeks ago
- SOC Workflow App helps Security Analysts and Threat Hunters explore suspicious events, look into raw events arriving at the Elastic Stack…☆94Updated 2 years ago
- Integrate Zeek with Alienvault OTX☆25Updated 4 years ago
- ☆34Updated last year
- Incident Response Network Tools☆24Updated 3 years ago
- Various Splunk Scripts and applets, all in one place☆33Updated last week
- Threat Intelligence with Elastic - Minemeld integration with Elasticsearch☆19Updated 4 years ago
- A collection of Cortex Analyzers and Responders for TheHive/Cortex☆13Updated 5 years ago
- MineMeld nodes for MISP☆19Updated last year
- Splunk Add on for OPNsense firewall☆2Updated 9 months ago
- ansible role to setup MISP, Malware Information Sharing Platform & Threat Sharing☆54Updated this week
- Splunk app to monitor the /etc directory of Splunk for all changes of .conf files☆13Updated 7 years ago
- ☆42Updated 2 years ago
- Learn about a network from a pcap file or reading from an interface☆29Updated last year
- scripts to configure the Splunk Universal Forwarder in a locked down state☆40Updated 6 years ago
- Shell script to download apps from Splunkbase☆23Updated 5 years ago
- Utilizing your Threat data from a MISP instance into CarbonBlack Response by exposing the data in the Threat Intelligence Feed.☆20Updated 3 years ago
- The Project can be used to integrate QRadar with MISP Threat Sharing Platform☆39Updated 3 years ago
- Workflows for Shuffle☆23Updated 2 years ago
- Sysmon and wazuh integration with Sigma sysmon rules [updated]☆67Updated 3 years ago
- Import specific data sources into the Sigma generic and open signature format.☆78Updated 3 years ago