elastic / security-docsLinks
Elastic Security Documentation
☆91Updated this week
Alternatives and similar repositories for security-docs
Users that are interested in security-docs are comparing it to the libraries listed below
Sorting:
- elastic-package - Command line tool for developing Elastic Integrations☆67Updated last week
- ☆314Updated this week
- SIEM Logstash parsing for more than hundred technologies☆192Updated 2 weeks ago
- Security Analytics enables users for detecting security threats on their security event log data. It will also allow them to modify/tailo…☆93Updated 3 weeks ago
- OSSEM Common Data Model☆56Updated 3 years ago
- Phantom Apps Repo☆82Updated 4 years ago
- Apps to be used for Shuffle automation. Most of Shuffle's apps (2500+) are generated from APIs, and available in the search engine below:☆121Updated this week
- The Sigma command line interface based on pySigma☆171Updated last week
- Elastic Agent - single, unified way to add monitoring for logs, metrics, and other types of data to a host.☆225Updated this week
- Kestrel threat hunting language: building reusable, composable, and shareable huntflows across different data sources and threat intel.☆323Updated last year
- Translate an ECS mapping CSV to starter pipelines for Beats, Elasticsearch or Logstash☆54Updated 3 years ago
- The MITRE Security Automation Framework (SAF) Command Line Interface (CLI) brings together applications, techniques, libraries, and tools…☆170Updated this week
- SIEGMA - Transform Sigma rules into SIEM consumables☆157Updated 10 months ago
- OASIS TC Open Repository: TAXII 2 Client Library Written in Python☆120Updated last year
- Splunk Connect for Syslog☆172Updated this week
- OpenCTI Docker deployment helpers☆214Updated this week
- EPR package specifications☆19Updated this week
- Cisco Orbital - Osquery queries by Talos☆136Updated last year
- This project consists of an open source library allowing software to connect to data repositories using STIX Patterning, and return resul…☆259Updated last week
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆53Updated this week
- Collection of example YARA-L rules for use within Google Security Operations☆465Updated last month
- OCA-wide documentation shared by all sub-projects and repositories☆33Updated last year
- Wazuh - RESTful API☆80Updated last year
- OASIS TC Open Repository: Validator for STIX 2.0 JSON normative requirements and best practices☆60Updated 6 months ago
- List of sigma for a variety of threats for multiple log sources.☆13Updated 7 years ago
- Mapping Corelight or Zeek data to Elastic Common Schema fields☆34Updated 2 months ago
- Splunk Content Control Tool☆125Updated last week
- OSSEM Data Dictionaries☆65Updated last year
- Splunk Operator for Kubernetes☆247Updated this week
- Sublime rules for email attack detection, prevention, and threat hunting.☆340Updated this week