cvandeplas / ELK-forensics
ELK configuration files for Forensic Analysts and Incident Handlers (unmaintained)
☆179Updated 5 years ago
Alternatives and similar repositories for ELK-forensics:
Users that are interested in ELK-forensics are comparing it to the libraries listed below
- Cyber Analytics Platform and Examination System (CAPES) Project Page☆60Updated 5 years ago
- Docker container for MISP☆96Updated 6 years ago
- Collecting & Hunting for IOCs with gusto and style☆116Updated 6 years ago
- ☆71Updated 3 years ago
- Bro scripts written by CrowdStrike Services☆146Updated 3 years ago
- Improvements of/over the original rule2alert☆56Updated 10 years ago
- Dockerfiles for NSM tools☆84Updated 7 years ago
- Isolated, Scalable, & Lightweight Environment for Training☆111Updated 5 years ago
- A framework for receiving and redistributing abuse feeds☆123Updated 5 years ago
- Scripts for Bro IDS and ELK Stack☆56Updated 9 years ago
- Threatelligence is a simple cyber threat intelligence feed collector, using Elasticsearch, Kibana and Python to automatically collect int…☆147Updated 10 years ago
- Network Forensics Bro scripts & pcap samples☆62Updated 11 years ago
- Script for generating Bro intel files from pdf or html reports☆76Updated 9 years ago
- Bro scripts to be shared with the community☆109Updated 12 years ago
- Dashboards and loader for ROCK NSM dashboards☆48Updated 2 years ago
- a Malware/Threat Analyst Desktop☆89Updated 9 years ago
- SIFT Bootstrap Script☆146Updated 7 years ago
- Harbinger Threat Intelligence☆82Updated 9 years ago
- CIF v3 -- the fastest way to consume threat intelligence☆183Updated last year
- Bro scripts for the ROCK platform. http://rocknsm.io☆33Updated last year
- Bro-IDS scripts☆50Updated 8 years ago
- DEPRECATED - USE v3 (bearded-avenger)☆228Updated 7 years ago
- Bro/Zeek integration with osquery☆94Updated 4 years ago
- CRITs Services Collection☆184Updated 3 years ago
- Cyber Defence Monitoring Course Suite :: Suricata, Bro, Moloch☆61Updated 8 years ago
- Aggregates security threats from a number of online sources, and outputs to Syslog CEF, Snort Signatures, Iptables rules, hosts.deny, etc…☆79Updated 9 years ago
- Logstash configuration files for analyzing various types of logs☆25Updated 8 years ago
- Various Bro scripts☆96Updated 8 years ago
- Carbon Black Feeds☆72Updated last year
- ☆48Updated 9 years ago