dogoncouch / siemstressLinks
Very basic CLI SIEM (Security Information and Event Management system).
☆39Updated 7 years ago
Alternatives and similar repositories for siemstress
Users that are interested in siemstress are comparing it to the libraries listed below
Sorting:
- Repo of python/bash scripts for identifying IoC's in threat feed and other online tools☆27Updated 4 years ago
- Easy way to create a MISP event related to a Phishing page☆17Updated 2 years ago
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆35Updated 2 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated 8 months ago
- Best practices in threat intelligence☆47Updated 2 years ago
- The Fastest way to consume Threat Intel☆25Updated 3 years ago
- A simple ReST server to lookup threat actors (by name, synonym or UUID) and returning the corresponding MISP galaxy information about the…☆48Updated last year
- Build Automated Machine Images for MISP☆28Updated 2 years ago
- Sharing Threat Hunting runbooks☆26Updated 5 years ago
- A SIEM inspired by HECTOR, built on Django.☆29Updated 6 years ago
- Elasticsearch/Kibana environment and log data for Sigma workshop☆27Updated 5 years ago
- Modular command-line threat hunting tool & framework.☆17Updated 4 years ago
- Scripts to inject demo data and network traffic into an existing Alienvault/OSSIM installation☆21Updated 7 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago
- intelligence-icons is a collection of icons and diagrams for building training and marketing materials around Intelligence sharing; inclu…☆40Updated 6 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆35Updated 3 years ago
- ☆15Updated 3 years ago
- FIles and guides related to using Elasticstack as a SIEM☆12Updated 5 years ago
- Use DNS to hunt for threats including DGAs☆15Updated 9 years ago
- ☆13Updated 5 years ago
- List CVEs and details that apply to your infrastructure (pre-inventoried).☆10Updated 4 years ago
- Searches for Insider Threat Hunting☆32Updated 6 years ago
- ☆14Updated 7 years ago
- Exports MISP events to STIX and ingest into McAfee ESM☆15Updated 5 years ago
- ☆33Updated 5 months ago
- ☆30Updated 6 years ago
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Updated 5 years ago
- Snort_rules detection bad actors.☆28Updated 10 months ago
- Detect leaks in security event logs.☆20Updated 6 years ago
- ☆21Updated 3 years ago