adamstauffer / cyphonLinks
Open source incident management and response platform.
☆13Updated 7 years ago
Alternatives and similar repositories for cyphon
Users that are interested in cyphon are comparing it to the libraries listed below
Sorting:
- Manage, monitor and improve your cyber security posture.☆93Updated 2 years ago
- ☆54Updated 3 years ago
- ☆15Updated last year
- Corelight-Ansible-Roles are a collection of Ansible Roles and playbooks that install, configure, run and manage a variety of Corelight, S…☆16Updated 4 years ago
- A low/zero interaction ssh authentication logging honeypot☆23Updated last week
- Active Response plugin. Osquery to execute wazuh/ossec active response plugins. You can write your own plugins, easy to plug☆11Updated 5 years ago
- This is the public security policy of CISOfy, with extra resources like security tools.☆92Updated 5 years ago
- Scripts to deploy and update MISP in air-gapped environments☆16Updated 2 months ago
- Jimi is an automation first no-code platform designed and developed originally for Security Orchestration and Response. Since its launch …☆167Updated last year
- Open Source runtime scanner for Linux containers (LXD / LXC), It performs security audit checks based on CIS Linux containers Benchmark …☆26Updated last year
- Posture Attribute Collection and Evaluation☆23Updated 2 years ago
- A collection of awesome framework, libraries, documents, learning tutorials, resources about SOC 2 tools and processes.☆25Updated 3 years ago
- Documentation used for Shuffle☆20Updated this week
- Add a layer of active defense to your cloud applications.☆95Updated 2 weeks ago
- The Wazuh agent for endpoints.☆85Updated 3 months ago
- Draugnet is a lightweight, open-source tool for anonymous cyber threat reporting. Built for the MISP ecosystem, it lets users submit and …☆18Updated last month
- ☁️Haven GRC - easier governance, risk, and compliance 👨⚕️👮♀️🦸♀️🕵️♀️👩🔬☆103Updated 4 years ago
- An open source data loss prevention solution.☆98Updated 11 years ago
- AxoSyslog - the scalable security data processor☆97Updated this week
- Cerberus is a toolkit to receive, parse, process and automate abuse reports handling received by ISP or hosting providers.☆15Updated 6 years ago
- This python app generates NIST 800 53 control implementation for each control and generate the CSV file.☆52Updated last year
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Updated 5 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆28Updated 3 years ago
- Pritunl Access Control System☆10Updated 2 years ago
- (Unofficial) Wazuh integration to send alerts to IRIS.☆19Updated 9 months ago
- Own Certificate Authority - ownca☆35Updated last year
- Official documentation for TheHive Project applications☆21Updated 2 years ago
- D4 core software (server and sample sensor client)☆42Updated last year
- OPNids GUI, API and systems backend☆34Updated 6 years ago
- A web application to streamline the development of STIGs from SRGs☆80Updated this week