cert-ee / s4aLinks
S4A main repository. SaltStack states, install script and build scripts
☆26Updated 2 weeks ago
Alternatives and similar repositories for s4a
Users that are interested in s4a are comparing it to the libraries listed below
Sorting:
- Bro IDS + ELK Stack to detect and block data exfiltration☆46Updated 6 years ago
- Connect your mail client/infrastructure to MISP in order to create events based on the information contained within mails.☆69Updated last year
- ☆33Updated 5 years ago
- Create dataset for suricata with indicators of MISP instances and add sightings in MISP if an indicator of dataset generates an alert☆36Updated 2 years ago
- Generates visualizations from the output of flow tools such as SiLK.☆35Updated 8 years ago
- References for FIRST CTI 2019 Symposium presentation☆22Updated 6 years ago
- A website and framework for testing NIDS detection☆57Updated 3 years ago
- Utilizing your Threat data from a MISP instance into CarbonBlack Response by exposing the data in the Threat Intelligence Feed.☆19Updated 3 years ago
- Splunk integration with MISP☆12Updated 7 years ago
- Zeek package to generate a SMB client fingerprint☆27Updated 5 years ago
- Cyber Defence Monitoring Course Suite :: Suricata, Arkime (and others in the past)☆106Updated last year
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago
- Elasticsearch/Kibana environment and log data for Sigma workshop☆27Updated 5 years ago
- command line tool to use the DNSDB Flexible Search API extensions.☆16Updated 10 months ago
- server for indexing and querying passive DNS observations☆46Updated 3 months ago
- IntelMQ command line tool to process events and send out email notifications.☆9Updated last week
- Passive DNS Common Output Format☆36Updated 9 months ago
- SightingDB is a database for Sightings☆22Updated last year
- This repository hosts files relating to the TF-CSIRT Reference Security Incident Taxonomy Working Group.☆67Updated 2 months ago
- This package allows for creating alerts in The Hive from emails retrieved from a Microsoft Exchange mailbox.☆12Updated 7 years ago
- Exporting MISP event attributes to yara rules usable with Thor apt scanner☆24Updated 8 years ago
- Python script to automatically create sigma rules from The hive observables☆25Updated 6 years ago
- scan-detection policies for bro☆16Updated 5 months ago
- CyCAT.org API back-end server including crawlers☆29Updated 2 years ago
- Integrating Sysinternals Autoruns’ logs into Security Onion☆31Updated last year
- This project contains code for comparing or ranking APT capabilities and operational capacity. The metrics are meant to quantify, rank, o…☆35Updated 6 years ago
- Zeek support for Community ID flow hashing.☆35Updated last year
- ☆13Updated 3 years ago
- OSSEC Decoder & Rulesets for Sysmon Events☆15Updated 9 years ago
- Traceroute improved wrapper for CSIRT and CERT operators☆38Updated 8 months ago