corelight / zeek2es
A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for further processing!
☆34Updated 2 years ago
Alternatives and similar repositories for zeek2es:
Users that are interested in zeek2es are comparing it to the libraries listed below
- Remote Desktop Client Fingerprint script for Zeek. Based off of https://github.com/0x4D31/fatt☆39Updated last year
- Library of threat hunts to get any user started!☆42Updated 4 years ago
- An elevated STIX representation of the MITRE ATT&CK Groups knowledge base☆23Updated 2 years ago
- Threat Detection & Anomaly Detection rules for popular open-source components☆50Updated 2 years ago
- ☆34Updated 4 years ago
- ☆33Updated 3 years ago
- List of sigma for a variety of threats for multiple log sources.☆11Updated 6 years ago
- ☆48Updated 2 years ago
- Repo of python/bash scripts for identifying IoC's in threat feed and other online tools☆26Updated 4 years ago
- Automatic detection engineering technical state compliance☆54Updated 7 months ago
- Zeek Extension to Collect Metadata for Profiling of Endpoints and Proxies☆27Updated 10 months ago
- Suricata rule and intel index☆30Updated 2 months ago
- MasterParser is a simple, all-in-one, digital forensics artifact parser☆23Updated 3 years ago
- This repository hosts community contributed Kestrel huntflows (.hf) and huntbooks (.ipynb)☆32Updated last year
- CyCAT.org API back-end server including crawlers☆30Updated 2 years ago
- Automated detection rule analysis utility☆29Updated 2 years ago
- Threat Detection Rules (Snort/Sigma/Yara)☆13Updated last year
- Searches for Insider Threat Hunting☆30Updated 5 years ago
- ☆41Updated 10 months ago
- A website and framework for testing NIDS detection☆57Updated 3 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 5 years ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆53Updated 4 years ago
- Repository for SPEED SIEM Use Case Framework☆53Updated 4 years ago
- S2AN - Mapper of Sigma/Suricata Rules/Signatures ➡️ MITRE ATT&CK Navigator☆85Updated 2 years ago
- Threat Mapping Catalogue☆17Updated 3 years ago
- Workflows for Shuffle☆21Updated 2 years ago
- Mapping NSM rules to MITRE ATT&CK☆69Updated 4 years ago
- ☆78Updated 4 years ago
- Home to the ActorTrackr source code☆28Updated 7 years ago