Logging Made Easy (LME) is a no cost, open source platform that centralizes log collection, enhances threat detection, and enables real-time alerting, helping small to medium-sized organizations secure their infrastructure. LME Docs can be found at https://cisagov.github.io/lme-docs/docs/
☆1,409Apr 10, 2026Updated this week
Alternatives and similar repositories for LME
Users that are interested in LME are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆2,380Updated this week
- Automation to assess the state of your M365 tenant against CISA's baselines☆2,522Updated this week
- Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.☆3,106Mar 21, 2026Updated 3 weeks ago
- Untitled Goose Tool is a robust and flexible hunt and incident response tool that adds novel authentication and data gathering methods in…☆952Feb 11, 2026Updated 2 months ago
- Digging Deeper....☆3,889Updated this week
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Documentation and scripts to properly enable Windows event logs.☆688Oct 3, 2025Updated 6 months ago
- A web application that assists network defenders, analysts, and researchers in the process of mapping adversary behaviors to the MITRE AT…☆1,212Feb 20, 2026Updated last month
- Cybersecurity Evaluation Tool☆1,805Updated this week
- SCuBA Secure Configuration Baselines and assessment tool for Google Workspace☆318Updated this week
- A repository of sysmon configuration modules☆3,016Aug 21, 2024Updated last year
- OT security monitoring #nsacyber☆620Jan 7, 2024Updated 2 years ago
- This project aims to compare and evaluate the telemetry of various EDR products.☆1,944Mar 26, 2026Updated 2 weeks ago
- Lambda function that streamlines containment of an AWS account compromise☆344Dec 1, 2023Updated 2 years ago
- SessionProbe is a multi-threaded tool designed for penetration testing and bug bounty hunting. It evaluates user privileges in web applic…☆461Mar 28, 2024Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- FalconHound is a blue team multi-tool. It allows you to utilize and enhance the power of BloodHound in a more automated fashion. It is de…☆819Updated this week
- MasterParser is a powerful DFIR tool designed for analyzing and parsing Linux logs☆758Feb 1, 2026Updated 2 months ago
- Rapidly Search and Hunt through Windows Forensic Artefacts☆3,509Apr 1, 2026Updated 2 weeks ago
- Security Onion is a free and open platform for threat hunting, enterprise security monitoring, and log management. It includes our own in…☆4,541Updated this week
- Attack Graph Visualizer and Explorer (Active Directory) ...Who's *really* Domain Admin?☆2,150Feb 21, 2026Updated last month
- KQL Queries. Defender For Endpoint and Azure Sentinel Hunting and Detection Queries in KQL. Out of the box KQL queries for: Advanced Hunt…☆1,679Apr 3, 2026Updated last week
- A small tool built to find and fix common misconfigurations in Active Directory Certificate Services.☆1,496Feb 18, 2026Updated last month
- Main Sigma Rule Repository☆10,309Apr 1, 2026Updated 2 weeks ago
- game of active directory☆7,691Mar 12, 2026Updated last month
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Sysmon configuration file template with default high-quality event tracing☆5,468Jul 3, 2024Updated last year
- ☆2,397Oct 14, 2023Updated 2 years ago
- Detect Tactics, Techniques & Combat Threats☆2,277Jan 21, 2026Updated 2 months ago
- A standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logs☆801Apr 6, 2026Updated last week
- This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. Contains multiple…☆817Apr 8, 2026Updated last week
- Your Everyday Threat Intelligence☆1,967Apr 6, 2026Updated last week
- IntelOwl: manage your Threat Intelligence at scale☆4,534Apr 8, 2026Updated last week
- Configuration files for the SOF-ELK VM☆1,729Jan 21, 2026Updated 2 months ago
- A PowerShell module for acquisition of data from Microsoft 365 and Azure for Incident Response and Cyber Security purposes.☆789Mar 25, 2026Updated 3 weeks ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- TrustedSec Sysinternals Sysmon Community Guide☆1,391Feb 10, 2026Updated 2 months ago
- PowerShell Digital Forensics & Incident Response Scripts.☆781Jan 14, 2026Updated 3 months ago
- Configuration guidance for implementing collection of security relevant Windows Event Log events by using Windows Event Forwarding. #nsac…☆884Nov 17, 2020Updated 5 years ago
- Shuffle: A general purpose security automation platform. Our focus is on collaboration and resource sharing.☆2,240Updated this week
- Awesome list of keywords and artifacts for Threat Hunting sessions☆653Aug 4, 2025Updated 8 months ago
- Open Cyber Threat Intelligence Platform☆9,128Apr 8, 2026Updated last week
- This publication is a collection of various common attack scenarios on Microsoft Entra ID (formerly known as Azure Active Directory) and …☆2,494Apr 3, 2026Updated last week