Logging Made Easy (LME) is a no cost, open source platform that centralizes log collection, enhances threat detection, and enables real-time alerting, helping small to medium-sized organizations secure their infrastructure. LME Docs can be found at https://cisagov.github.io/lme-docs/docs/
☆1,424May 1, 2026Updated this week
Alternatives and similar repositories for LME
Users that are interested in LME are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆2,395Updated this week
- Automation to assess the state of your M365 tenant against CISA's baselines☆2,552Updated this week
- Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.☆3,135Updated this week
- Untitled Goose Tool is a robust and flexible hunt and incident response tool that adds novel authentication and data gathering methods in…☆954Feb 11, 2026Updated 2 months ago
- Digging Deeper....☆3,936Updated this week
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Documentation and scripts to properly enable Windows event logs.☆694Oct 3, 2025Updated 7 months ago
- A web application that assists network defenders, analysts, and researchers in the process of mapping adversary behaviors to the MITRE AT…☆1,213Feb 20, 2026Updated 2 months ago
- Cybersecurity Evaluation Tool☆1,820Apr 23, 2026Updated last week
- SCuBA Secure Configuration Baselines and assessment tool for Google Workspace☆328Updated this week
- A repository of sysmon configuration modules☆3,031Aug 21, 2024Updated last year
- OT security monitoring #nsacyber☆623Jan 7, 2024Updated 2 years ago
- This project aims to compare and evaluate the telemetry of various EDR products.☆1,951Apr 28, 2026Updated last week
- SessionProbe is a multi-threaded tool designed for penetration testing and bug bounty hunting. It evaluates user privileges in web applic…☆463Mar 28, 2024Updated 2 years ago
- Lambda function that streamlines containment of an AWS account compromise☆345Dec 1, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- FalconHound is a blue team multi-tool. It allows you to utilize and enhance the power of BloodHound in a more automated fashion. It is de…☆821Apr 18, 2026Updated 2 weeks ago
- MasterParser is a powerful DFIR tool designed for analyzing and parsing Linux logs☆759Feb 1, 2026Updated 3 months ago
- Rapidly Search and Hunt through Windows Forensic Artefacts☆3,534Updated this week
- Security Onion is a free and open platform for threat hunting, enterprise security monitoring, and log management. It includes our own in…☆4,588Updated this week
- Attack Graph Visualizer and Explorer (Active Directory) ...Who's *really* Domain Admin?☆2,162Apr 12, 2026Updated 3 weeks ago
- KQL Queries. Defender For Endpoint and Azure Sentinel Hunting and Detection Queries in KQL. Out of the box KQL queries for: Advanced Hunt…☆1,690Apr 13, 2026Updated 3 weeks ago
- A small tool built to find and fix common misconfigurations in Active Directory Certificate Services.☆1,512Feb 18, 2026Updated 2 months ago
- Main Sigma Rule Repository☆10,386Updated this week
- game of active directory☆7,771Mar 12, 2026Updated last month
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Sysmon configuration file template with default high-quality event tracing☆5,499Jul 3, 2024Updated last year
- ☆2,403Oct 14, 2023Updated 2 years ago
- Detect Tactics, Techniques & Combat Threats☆2,286Apr 29, 2026Updated last week
- A standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logs☆806Apr 6, 2026Updated 3 weeks ago
- This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. Contains multiple…☆827Updated this week
- Your Everyday Threat Intelligence☆1,977Apr 14, 2026Updated 3 weeks ago
- IntelOwl: manage your Threat Intelligence at scale☆4,560Updated this week
- Configuration files for the SOF-ELK VM☆1,733Jan 21, 2026Updated 3 months ago
- A PowerShell module for acquisition of data from Microsoft 365 and Azure for Incident Response and Cyber Security purposes.☆796Apr 23, 2026Updated last week
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- TrustedSec Sysinternals Sysmon Community Guide☆1,403Feb 10, 2026Updated 2 months ago
- PowerShell Digital Forensics & Incident Response Scripts.☆783Jan 14, 2026Updated 3 months ago
- Configuration guidance for implementing collection of security relevant Windows Event Log events by using Windows Event Forwarding. #nsac…☆884Nov 17, 2020Updated 5 years ago
- Shuffle: A general purpose security automation platform. Our focus is on collaboration and resource sharing.☆2,274Updated this week
- Awesome list of keywords and artifacts for Threat Hunting sessions☆655Aug 4, 2025Updated 9 months ago
- Open Cyber Threat Intelligence Platform☆9,231Updated this week
- This publication is a collection of various common attack scenarios on Microsoft Entra ID (formerly known as Azure Active Directory) and …☆2,514Apr 20, 2026Updated 2 weeks ago