airbus-cyber / graylog-plugin-correlation-countLinks
Alert condition plugin for Graylog to perform correlation
☆27Updated 3 months ago
Alternatives and similar repositories for graylog-plugin-correlation-count
Users that are interested in graylog-plugin-correlation-count are comparing it to the libraries listed below
Sorting:
- Alert condition plugin for Graylog to perform aggregation☆21Updated 2 years ago
- Alert notification plugin for Graylog to generate log messages from alerts☆26Updated 3 weeks ago
- Alert Wizard plugin for Graylog to manage the alert rules☆49Updated 3 weeks ago
- ☆23Updated 6 years ago
- SIEM Logstash parsing for more than hundred technologies☆187Updated last week
- Configuration for a Palo Alto Networks fed ELK Stack with Visualizations☆74Updated 6 years ago
- Example configuration files for Logstash☆44Updated 5 years ago
- Fortinet products logs to Elasticsearch☆98Updated this week
- GrayLog2 QuickValuesPlus Widget☆22Updated 6 years ago
- Sysmon and wazuh integration with Sigma sysmon rules [updated]☆70Updated 4 years ago
- Official Palo Alto Networks MineMeld docker☆17Updated 5 years ago
- ☆12Updated 5 years ago
- DynamiteNSM is a free Network Security Monitor developed by Dynamite Analytics to enable network visibility and advanced cyber threat det…☆171Updated 2 years ago
- An Ansible playbook for deploying the Suricata intrusion detection system and fetching Snort rules with Oinkmaster.☆17Updated 3 years ago
- Threat Intelligence with Elastic - Minemeld integration with Elasticsearch☆19Updated 4 years ago
- Kibana 7 Templates for Suricata IDPS Threat Hunting☆43Updated 2 weeks ago
- Wazuh - Splunk App☆56Updated last year
- How to send structured Snort IDS alert logs into Graylog☆27Updated last year
- Useful scripts for those administering Wazuh☆86Updated last week
- Graylog Processing Pipeline functions to enrich log messages with IoC information from threat intelligence databases☆155Updated last year
- ☆38Updated 5 years ago
- MineMeld nodes for MISP☆19Updated last year
- A Ruleset to enhance detection capabilities of Ossec using Sysmon☆95Updated 3 years ago
- Installation script for ELK stack to make life easy.☆69Updated 5 years ago
- Parse wazuh[HIDS] alerts into ECS mapping using Filebeat☆28Updated 5 years ago
- Kibana 6 Templates for Suricata IDPS Threat Hunting☆24Updated 6 years ago
- Elastic Beat for fetching and shipping Office 365 audit events☆68Updated 5 years ago
- The Project can be used to integrate QRadar with MISP Threat Sharing Platform☆40Updated 3 years ago
- Generate syslog messages to test logging solutions.☆57Updated last year
- ☆19Updated 3 years ago