eddiechu / Terminal-SIEMLinks
Super light, super fast, unlimited search idea
☆25Updated 4 months ago
Alternatives and similar repositories for Terminal-SIEM
Users that are interested in Terminal-SIEM are comparing it to the libraries listed below
Sorting:
- A simple-to-use IR (incident response) case management tool for tracking and documenting investigations.☆412Updated 2 months ago
- Playbook-NG is a stateless web-based application used to match incident findings with countermeasures for adversary containment and evict…☆152Updated last week
- Provides an advanced baseline to implement a secure Windows auditing strategy on Windows OS.☆57Updated 6 months ago
- Online resources related to Detection Engineering. Detection rules, detection logic, attack samples, detection tests and emulation tools…☆133Updated 2 weeks ago
- Mapping of open-source detection rules and atomic tests.☆189Updated 10 months ago
- The Eventlog Compendium is the go-to resource for understanding Windows Event Logs.☆50Updated 7 months ago
- Automation tool for Windows Deception Host Burn-In☆86Updated last year
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆159Updated 8 months ago
- Web based S1 query navigator for one-click threat hunting☆24Updated 4 years ago
- Convert a variety of log formats to CSV while enriching detected IPs with Geolocation, ASN, DNS, WhoIs, Shodan InternetDB and Threat Indi…☆108Updated last year
- Integrate your Wazuh-Manager or Graylog with the SOCFortress Threat Intel Service☆31Updated last year
- ASR Configurator, Essentials and Atomic Testing☆99Updated 7 months ago
- MISP to Sentinel integration☆77Updated last week
- VirtualGHOST Detection Tool☆100Updated last week
- An index of publicly available and open-source threat detection rulesets.☆132Updated 7 months ago
- ☆117Updated 6 months ago
- Collection of Remote Management Monitoring tool artifacts, for assisting forensics and investigations☆101Updated 3 months ago
- Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Group☆86Updated 10 months ago
- Have you ever wanted to search a link or IP address on multiple OSINT pages at once?☆58Updated 5 months ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆125Updated last year
- Digital forensic analysis tool that provides a user-friendly interface for investigating disk images.☆199Updated 3 weeks ago
- Project based on RegRipper, to extract add'l value/pivot points from TLN events file☆88Updated 10 months ago
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆81Updated 7 months ago
- Collection of different Azure/Entra focused solutions (Deployable templates, Function Apps, etc)☆78Updated 3 weeks ago
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆196Updated last month
- ☆73Updated 2 weeks ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆150Updated last year
- ☆53Updated last year
- An IDE and translation engine for detection engineers and threat hunters. Be faster, write smarter, keep 100% privacy.☆166Updated last week
- Visualize Microsoft Defender XDR process trees and security events☆33Updated 3 months ago