airbus-cyber / graylog-plugin-correlation-count
Alert condition plugin for Graylog to perform correlation
☆25Updated 4 months ago
Alternatives and similar repositories for graylog-plugin-correlation-count
Users that are interested in graylog-plugin-correlation-count are comparing it to the libraries listed below
Sorting:
- Alert condition plugin for Graylog to perform aggregation☆20Updated 2 years ago
- Alert notification plugin for Graylog to generate log messages from alerts☆25Updated 3 weeks ago
- Alert Wizard plugin for Graylog to manage the alert rules☆48Updated last week
- Configuration for a Palo Alto Networks fed ELK Stack with Visualizations☆73Updated 6 years ago
- Fortinet products logs to Elasticsearch☆98Updated 8 months ago
- SIEM Logstash parsing for more than hundred technologies☆184Updated 3 weeks ago
- PANW Firewall Visualisations using Elastic Stack☆91Updated 2 years ago
- ☆23Updated 5 years ago
- Initial Revision☆16Updated 6 years ago
- Customizable, production ready syslog and ArcSight output plugin for Graylog☆42Updated 10 months ago
- GrayLog2 QuickValuesPlus Widget☆22Updated 6 years ago
- Graylog plugin to receive SNMP traps☆28Updated last year
- Wazuh - Splunk App☆53Updated 7 months ago
- IRIS Module for Wazuh-Indexer Searching☆10Updated last year
- A simple script to extract policies from a FortiGate configuration file to CSV☆143Updated last year
- Example configuration files for Logstash☆44Updated 5 years ago
- Experimental DNS logs pipeline based on Pi-hole dnsmasq logs, ELK stack, and Filebeat. Sample configs included.☆30Updated last year
- Simple integration script for 3rd party systems such as SIEMs. Offers command line, file or syslog output in CEF, JSON or key-value pair …☆131Updated last year
- ☆36Updated last year
- Splunk App for Linux Auditd☆58Updated 3 years ago
- Useful scripts for those administering Wazuh☆83Updated this week
- Ansible playbook for installing MineMeld on Linux☆48Updated 4 years ago
- ☆38Updated 5 years ago
- Repository with logstash, elasticsearch and kibana configs. Palo Alto, Juniper, BlueCoat, etc.☆19Updated 11 months ago
- Parse wazuh[HIDS] alerts into ECS mapping using Filebeat☆27Updated 4 years ago
- ☆17Updated 3 years ago
- Kibana 7 Templates for Suricata IDPS Threat Hunting☆40Updated 2 years ago
- Sysmon and wazuh integration with Sigma sysmon rules [updated]☆65Updated 3 years ago
- Collection of Logstash Configs / Templates☆11Updated 8 years ago
- Graylog Processing Pipeline functions to enrich log messages with IoC information from threat intelligence databases☆153Updated last year