cisagov / LMELinks
Logging Made Easy (LME) is a no cost, open source platform that centralizes log collection, enhances threat detection, and enables real-time alerting, helping small to medium-sized organizations secure their infrastructure.
☆1,036Updated this week
Alternatives and similar repositories for LME
Users that are interested in LME are comparing it to the libraries listed below
Sorting:
- Automation to assess the state of your M365 tenant against CISA's baselines☆2,150Updated this week
- Untitled Goose Tool is a robust and flexible hunt and incident response tool that adds novel authentication and data gathering methods in…☆929Updated 3 weeks ago
- A PowerShell module for acquisition of data from Microsoft 365 and Azure for Incident Response and Cyber Security purposes.☆631Updated last week
- KQL Queries. Defender For Endpoint and Azure Sentinel Hunting and Detection Queries in KQL. Out of the box KQL queries for: Advanced Hunt…☆1,465Updated this week
- A web application that assists network defenders, analysts, and researchers in the process of mapping adversary behaviors to the MITRE AT…☆1,180Updated last week
- Incident Response Methodologies 2022☆1,052Updated last month
- Collaborative Incident Response platform☆1,196Updated this week
- PowerShell Digital Forensics & Incident Response Scripts.☆602Updated last month
- This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. Contains multiple…☆681Updated 4 months ago
- A repository of KQL queries focused on threat hunting and threat detecting for Microsoft Sentinel & Microsoft XDR (Former Microsoft 365 D…☆690Updated 2 weeks ago
- A repository of sysmon configuration modules☆2,786Updated 9 months ago
- Documentation and scripts to properly enable Windows event logs.☆611Updated last year
- Invoke-AtomicRedTeam is a PowerShell module to execute tests as defined in the [atomics folder](https://github.com/redcanaryco/atomic-red…☆909Updated last week
- Cybersecurity Evaluation Tool☆1,567Updated this week
- SCuBA Secure Configuration Baselines and assessment tool for Google Workspace☆230Updated this week
- Detection Engineering is a tactical function of a cybersecurity defense program that involves the design, implementation, and operation o…☆978Updated last month
- This project aims to compare and evaluate the telemetry of various EDR products.☆1,799Updated 3 weeks ago
- Advanced Wazuh Rules for more accurate threat detection. Feel free to implement within your own Wazuh environment, contribute, or fork!☆746Updated 2 weeks ago
- A concise, directive, specific, flexible, and free incident response plan template☆707Updated last year
- Streamline vulnerability patching with CVSS, EPSS, and CISA's Known Exploited Vulnerabilities. Prioritize actions based on real-time thre…☆644Updated 2 months ago
- KQL Queries. Microsoft Defender, Microsoft Sentinel☆630Updated this week
- TrustedSec Sysinternals Sysmon Community Guide☆1,217Updated last year
- Powershell Based tool for gathering information related to O365 intrusions and potential Breaches☆847Updated 2 months ago
- Incident Response Documentation made easy. Developed by Incident Responders for Incident Responders☆906Updated last year
- Monkey365 provides a tool for security consultants to easily conduct not only Microsoft 365, but also Azure subscriptions and Microsoft E…☆964Updated last week
- Automation scripts to deploy Windows Event Forwarding, Sysmon, and custom audit policies in an Active Directory environment.☆481Updated 6 months ago
- Cyber Incident Response Team Playbook Battle Cards☆377Updated last year
- WELA (Windows Event Log Analyzer): The Swiss Army knife for Windows Event Logs! ゑ羅(ウェラ)☆783Updated 2 years ago
- FalconHound is a blue team multi-tool. It allows you to utilize and enhance the power of BloodHound in a more automated fashion. It is de…☆799Updated 3 months ago
- Detect Tactics, Techniques & Combat Threats☆2,161Updated this week