corelight / raspi-corelightLinks
Corelight@Home script
☆43Updated last year
Alternatives and similar repositories for raspi-corelight
Users that are interested in raspi-corelight are comparing it to the libraries listed below
Sorting:
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆73Updated 2 years ago
- A collection of tips for using MISP.☆74Updated 9 months ago
- Collection of walkthroughs on various threat hunting techniques☆75Updated 5 years ago
- ☆53Updated 3 years ago
- A tool to modify timestamps in a packet capture to a user selected date☆31Updated 4 years ago
- ☆42Updated 2 years ago
- ☆67Updated this week
- A community event for security researchers to share their favorite notebooks☆108Updated last year
- Run Velociraptor on Security Onion☆39Updated 3 years ago
- Incident response teams usually working on the offline data, collecting the evidence, then analyze the data☆45Updated 3 years ago
- Recon Hunt Queries☆78Updated 4 years ago
- Repository for SPEED SIEM Use Case Framework☆55Updated 5 years ago
- Incident Response Network Tools☆24Updated 4 years ago
- CSIRT Jump Bag☆26Updated last year
- ☆55Updated 4 years ago
- Powershell - web traffic whitenoise generator☆47Updated 5 years ago
- Python library for threat intelligence☆87Updated 8 months ago
- My Jupyter Notebooks☆36Updated 6 months ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆46Updated last year
- RRR (Rapid Response Reporting) is a collection of Incident Response Report objects. They are designed to help incident responders provid…☆37Updated 3 years ago
- Create alerts in The Hive from your Graylog alerts, to be turned into Hive cases.☆45Updated 5 years ago
- Use Terraform to Provision Your Own Cloud-Based Remote Browsing Workstation☆26Updated last year
- Provides detection capabilities and log conversion to evtx or syslog capabilities☆54Updated 3 years ago
- Cumulonimbus-UAL_Extractor is a PowerShell based tool created by the Tesorion CERT team to help gather the Unified Audit Logging out of a…☆21Updated last year
- Synthetic Adversarial Log Objects: A Framework for synthentic log generation☆84Updated last year
- Python command line tool used for generating GIAC Certification indexes.☆27Updated 2 years ago
- ☆36Updated 4 years ago
- Identifies physical locations where a laptop has been based upon wireless profiles and wireless data recorded in event logs☆93Updated 4 years ago
- A PowerShell incident response script for quick triage☆80Updated 3 years ago
- Run zeek with zeekctl in docker☆55Updated last year