Security event correlation engine for ELK stack
☆445Jun 26, 2024Updated last year
Alternatives and similar repositories for dsiem
Users that are interested in dsiem are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Load MISP events into memcached for log enrichment using logstash☆12Jul 10, 2020Updated 5 years ago
- Threat Detection & Anomaly Detection rules for popular open-source components☆53Jul 27, 2022Updated 3 years ago
- SIEGMA - Transform Sigma rules into SIEM consumables☆159Mar 10, 2025Updated last year
- Open Source Security Events Metadata (OSSEM)☆1,290Feb 27, 2023Updated 3 years ago
- Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability in long term o…☆2,624Dec 13, 2025Updated 3 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- The Hunting ELK☆3,911Jun 1, 2024Updated last year
- Endpoint detection & Malware analysis software☆230Dec 20, 2019Updated 6 years ago
- My logstash plugins. Filter: sig (for security detect -> IOC, sig, New value, Reference, link, frequence, ...). Output: alert created by …☆10Jul 26, 2019Updated 6 years ago
- Create actionable data from your Vulnerability Scans☆1,395Dec 27, 2022Updated 3 years ago
- Detect Tactics, Techniques & Combat Threats☆2,270Jan 21, 2026Updated 2 months ago
- Actionable analytics designed to combat threats☆1,006May 25, 2022Updated 3 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆75Jan 18, 2022Updated 4 years ago
- Windows Events Attack Samples☆2,531Jan 24, 2023Updated 3 years ago
- Configuration files for the SOF-ELK VM☆1,724Jan 21, 2026Updated 2 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- This project is a SIEM with SIRP and Threat Intel, all in one.☆461Nov 20, 2024Updated last year
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,515Jan 12, 2026Updated 2 months ago
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,508Jan 12, 2026Updated 2 months ago
- ☆2,531Updated this week
- Automatic detection engineering technical state compliance☆55Jul 7, 2024Updated last year
- Beagle is an incident response and digital forensics tool which transforms security logs and data into graphs.☆1,341Dec 13, 2022Updated 3 years ago
- Test Blue Team detections without running any attack.☆272May 2, 2024Updated last year
- Shuffle: A general purpose security automation platform. Our focus is on collaboration and resource sharing.☆2,221Mar 18, 2026Updated last week
- thethe☆115Oct 21, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- DFIRTrack - The Incident Response Tracking Application☆534Jan 13, 2026Updated 2 months ago
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆2,369Updated this week
- Malware similarity platform with modularity in mind.☆80Jul 18, 2021Updated 4 years ago
- Open-source framework to detect outliers in Elasticsearch events☆205May 22, 2023Updated 2 years ago
- DetectionLabELK is a fork from DetectionLab with ELK stack instead of Splunk.☆573Dec 12, 2021Updated 4 years ago
- Your Everyday Threat Intelligence☆1,962Mar 23, 2026Updated last week
- Investigate suspicious activity by visualizing Sysmon's event log☆430Dec 22, 2023Updated 2 years ago
- collector/runner☆64Sep 6, 2025Updated 6 months ago
- Re-play Security Events☆1,729Mar 20, 2024Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Sysmon EDR POC Build within Powershell to prove ability.☆223May 1, 2021Updated 4 years ago
- VECTR is a tool that facilitates tracking of your red and blue team testing activities to measure detection and prevention capabilities a…☆1,555Mar 12, 2026Updated 2 weeks ago
- TheHive is a Collaborative Case Management Platform, now distributed as a commercial version☆3,896Jul 25, 2025Updated 8 months ago
- Extract and aggregate threat intelligence.☆907Jan 31, 2024Updated 2 years ago
- Tools to rapidly deploy a threat hunting capability on Azure Sentinel that leverages Sysmon and MITRE ATT&CK☆1,080Nov 28, 2024Updated last year
- A collection of Cortex Analyzers and Responders for TheHive/Cortex☆13Jan 29, 2020Updated 6 years ago
- A tool to assess data quality, built on top of the awesome OSSEM.☆80Jul 29, 2022Updated 3 years ago