akamai / ulsLinks
Unified Log Streamer (ULS)
☆34Updated 3 weeks ago
Alternatives and similar repositories for uls
Users that are interested in uls are comparing it to the libraries listed below
Sorting:
- A simple Docker container that serves the MITRE ATT&CK Navigator web app☆27Updated 2 years ago
- Automated daily scan using Nmap and report on the differences☆92Updated 7 years ago
- Visual Studio Code extension for MITRE ATT&CK☆55Updated last year
- Create alerts in The Hive from your Graylog alerts, to be turned into Hive cases.☆45Updated 5 years ago
- Wrap any binary into a cached webserver☆56Updated 3 years ago
- Tool for quickly gathering information from Shodan.io about the number of IPs which satisfy large number of different queries☆52Updated 3 years ago
- vSphere Security Audit Scripts, Based on the vSphere Hardening Guide.☆26Updated 4 years ago
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆95Updated 4 years ago
- Scripts to inject demo data and network traffic into an existing Alienvault/OSSIM installation☆21Updated 8 years ago
- Coding examples for the OpenDNS Investigate API☆24Updated 6 years ago
- ansible role to setup MISP, Malware Information Sharing Platform & Threat Sharing☆54Updated last week
- ☆33Updated 7 years ago
- A tool to modify timestamps in a packet capture to a user selected date☆31Updated 4 years ago
- Example Suricata rules implementing some of my detection tactics☆22Updated 3 years ago
- An Ansible playbook for deploying the Suricata intrusion detection system and fetching Snort rules with Oinkmaster.☆17Updated 4 years ago
- SentinelOne's SACK CVE Fixer☆22Updated 6 years ago
- ☆30Updated 7 years ago
- Snapshot, patch, health-check, and potentially roll-back Windows VMs☆35Updated 7 years ago
- Automatic Sender Policy Framework Reconnaissance☆19Updated 7 years ago
- Some resources to facilitate my blog on auditd for security monitoring☆13Updated 2 years ago
- Workflows for Shuffle☆24Updated 3 years ago
- PowerShell Memory Pulling script☆19Updated 10 years ago
- Table Top Exercise (TTX) for Computer Security Incident Response (CSIRT) teams. The templatized artifacts provided will hopefully help te…☆44Updated 5 years ago
- misp-cloud - Cloud-ready images of MISP☆74Updated 3 years ago
- Secure and log *available* activities in your Microsoft Office 365 environment☆39Updated 7 years ago
- This repository contains advanced threat hunting scripts for Cisco Secure Endpoint API. The scripts leverage the AMP API to hunt for thre…☆14Updated 6 months ago
- Send your nessus compliance and vulnerability scan data to ElasticSearch☆28Updated 7 years ago
- MineMeld nodes for MISP☆19Updated last year
- ☆79Updated last month
- A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the…☆63Updated last month