amitn322 / blackeskLinks
BLACK ESK SIEM is a SIEM platform built with Elasticsearch, Syslog-Ng and Kibana
☆28Updated 2 years ago
Alternatives and similar repositories for blackesk
Users that are interested in blackesk are comparing it to the libraries listed below
Sorting:
- A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the…☆63Updated 3 years ago
- Incident Response Network Tools☆24Updated 4 years ago
- Cyber Analytics Platform and Examination System (CAPES) Project Page☆14Updated 3 years ago
- Corelight@Home script☆45Updated 2 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆35Updated 3 years ago
- Deploy an "illegal" SOC to manage vulnerabilities on your city servers in minutes.☆20Updated 2 years ago
- An experimental Velociraptor implementation using cloud infrastructure☆26Updated this week
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- ELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)☆47Updated 4 years ago
- Lokix Platform is a free open-source solution to help blue teams and threat hunters use Loki Scanner to sweep enterprise networks☆25Updated 5 years ago
- Create alerts in The Hive from your Graylog alerts, to be turned into Hive cases.☆45Updated 5 years ago
- Snapshot, patch, health-check, and potentially roll-back Windows VMs☆35Updated 7 years ago
- Python command line tool used for generating GIAC Certification indexes.☆27Updated 2 years ago
- Pure Honeypots with an automated bash script☆20Updated 4 years ago
- A real-time Grafana dashboard using MISP ZeroMQ message queue and InfluxDB☆18Updated last year
- ☆18Updated 11 months ago
- Tool for quickly gathering information from Shodan.io about the number of IPs which satisfy large number of different queries☆49Updated 2 years ago
- Helpful tools for interacting with a GoPhish phishing instance☆50Updated this week
- CSI SIEM☆110Updated 2 years ago
- A python script to acquire multiple aws ec2 instances in a forensically sound-ish way☆38Updated 4 years ago
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆95Updated 4 years ago
- Hashes of infamous malware☆26Updated 2 years ago
- ☆79Updated last week
- Accompanying documentation, images, source code and other stuff from the cybernomad.online blog☆27Updated 5 years ago
- Wrap any binary into a cached webserver☆56Updated 3 years ago
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Updated 5 years ago
- Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.☆23Updated 9 years ago
- A tool to modify timestamps in a packet capture to a user selected date☆31Updated 4 years ago
- You and the AppleLabs' Incident Response Team have been notified of a potential breach to a Human Resources' workstation. According to th…☆76Updated 3 years ago
- ☆14Updated 4 years ago