coolacid / GettingStartedWithELKLinks
Getting Started with ELK
☆50Updated 9 years ago
Alternatives and similar repositories for GettingStartedWithELK
Users that are interested in GettingStartedWithELK are comparing it to the libraries listed below
Sorting:
- bro on debian with elasticsearch support☆24Updated 8 years ago
- Ansible playbook to install Malware Information Sharing Platform (MISP)☆17Updated 10 years ago
- ☆47Updated 10 years ago
- MISP - Ansible installation script☆22Updated 6 years ago
- Transfer Kippo data to ElasticSearch☆18Updated 9 years ago
- brocon-15 scripts☆13Updated 8 years ago
- The Auditd Framework logs and applies security policy to linux auditd data☆15Updated 7 years ago
- brostash: Linux distribution based on Debian and focusing on network security events collection☆34Updated 5 years ago
- Scripts and integrations for OSSEC☆41Updated 9 years ago
- Collection of Auditd Examples and Presentations☆85Updated 4 years ago
- ☆24Updated 5 years ago
- ☆20Updated 5 years ago
- Bro IDS + ELK Stack to detect and block data exfiltration☆46Updated 6 years ago
- ☆49Updated 10 years ago
- Generates visualizations from the output of flow tools such as SiLK.☆35Updated 8 years ago
- A shell script to download malware domains from various sources, and configuring unbound DNS config file to be used as a local recursive …☆18Updated 11 years ago
- Security Onion Elastic Stack☆46Updated 4 years ago
- Traceroute improved wrapper for CSIRT and CERT operators☆38Updated 11 months ago
- PacketSled's Bro AMQP Writer Plugin☆11Updated 9 years ago
- Detect Phishing with Bro IDS☆19Updated 8 years ago
- dnshjmon is a free tool to monitor public DNS records and report hijacks☆91Updated 11 years ago
- Expandable Defensive Cyber Operations Platform☆43Updated 3 years ago
- A Docker container for Moloch based on minimal Debian☆26Updated 9 years ago
- ☆141Updated last year
- NMap XML decoding for logstash☆28Updated 2 years ago
- A python script to shift the timestamp on syslog data. Useful for forensicators combating time skew.☆21Updated 3 years ago
- Install and configure user mode auditd tools☆34Updated 2 years ago
- ☆11Updated 7 years ago
- Scripts to detect Fast-Flux and DGA using DNS query responses☆43Updated 8 years ago
- Snort rules to detect local malware, phishing, and adult content by inspecting DNS responses from OpenDNS☆52Updated 9 years ago