adamstauffer / cyphonLinks
Open source incident management and response platform.
☆13Updated 7 years ago
Alternatives and similar repositories for cyphon
Users that are interested in cyphon are comparing it to the libraries listed below
Sorting:
- This is the public security policy of CISOfy, with extra resources like security tools.☆92Updated 5 years ago
- Manage, monitor and improve your cyber security posture.☆93Updated 2 years ago
- ☆55Updated 3 years ago
- Wazuh - Quality Assurance☆67Updated last month
- Jimi is an automation first no-code platform designed and developed originally for Security Orchestration and Response. Since its launch …☆167Updated last year
- Corelight-Ansible-Roles are a collection of Ansible Roles and playbooks that install, configure, run and manage a variety of Corelight, S…☆16Updated 4 years ago
- Active Response plugin. Osquery to execute wazuh/ossec active response plugins. You can write your own plugins, easy to plug☆11Updated 5 years ago
- ☁️Haven GRC - easier governance, risk, and compliance 👨⚕️👮♀️🦸♀️🕵️♀️👩🔬☆103Updated 4 years ago
- Dockerized Eramba, Open Source Governance, Risk & Compliance (GRC) system https://hub.docker.com/r/digitorus/er…☆30Updated 6 years ago
- Posture Attribute Collection and Evaluation☆24Updated 2 years ago
- D4 core software (server and sample sensor client)☆42Updated last year
- Pritunl Access Control System☆10Updated 2 years ago
- (Unofficial) Wazuh integration to send alerts to IRIS.☆20Updated 10 months ago
- A low/zero interaction ssh authentication logging honeypot☆24Updated last month
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Updated 5 years ago
- Open Source runtime scanner for Linux containers (LXD / LXC), It performs security audit checks based on CIS Linux containers Benchmark …☆26Updated last year
- Scripts to deploy and update MISP in air-gapped environments☆16Updated 3 weeks ago
- Security Analytics enables users for detecting security threats on their security event log data. It will also allow them to modify/tailo…☆91Updated this week
- Example Suricata rules implementing some of my detection tactics☆22Updated 2 years ago
- Kibana 6 Templates for Suricata IDPS Threat Hunting☆24Updated 6 years ago
- ☆15Updated last year
- Collaborative, web-based case management for incident response☆23Updated last year
- OSCAL SSP content for technologies shipped by Red Hat☆15Updated 2 years ago
- ansible role to setup MISP, Malware Information Sharing Platform & Threat Sharing☆54Updated last week
- Add a layer of active defense to your cloud applications.☆99Updated last week
- Kestrel Jupyter Notebook Kernel☆10Updated 2 years ago
- This python app generates NIST 800 53 control implementation for each control and generate the CSV file.☆53Updated last year
- A library and a tool for converting audit logs to XML and JSON☆46Updated 7 years ago
- Firepit - STIX Columnar Storage☆17Updated last year
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆28Updated 3 years ago