elastic / security-docsLinks
Elastic Security Documentation
☆91Updated this week
Alternatives and similar repositories for security-docs
Users that are interested in security-docs are comparing it to the libraries listed below
Sorting:
- ☆314Updated this week
- elastic-package - Command line tool for developing Elastic Integrations☆68Updated this week
- Apps to be used for Shuffle automation. Most of Shuffle's apps (2500+) are generated from APIs, and available in the search engine below:☆122Updated 2 weeks ago
- SIEM Logstash parsing for more than hundred technologies☆193Updated 2 weeks ago
- Demisto SDK - Create Demisto Content with ease and efficiency☆81Updated this week
- Security Analytics enables users for detecting security threats on their security event log data. It will also allow them to modify/tailo…☆94Updated this week
- EPR package specifications☆20Updated this week
- Splunk Connect for Syslog☆172Updated last week
- OSSEM Common Data Model☆56Updated 3 years ago
- Elastic Agent - single, unified way to add monitoring for logs, metrics, and other types of data to a host.☆228Updated last week
- The Sigma command line interface based on pySigma☆176Updated 3 weeks ago
- OpenCTI Docker deployment helpers☆216Updated this week
- This project consists of an open source library allowing software to connect to data repositories using STIX Patterning, and return resul…☆259Updated 2 weeks ago
- The MITRE Security Automation Framework (SAF) Command Line Interface (CLI) brings together applications, techniques, libraries, and tools…☆171Updated this week
- SIEGMA - Transform Sigma rules into SIEM consumables☆159Updated 10 months ago
- OASIS TC Open Repository: Validator for STIX 2.0 JSON normative requirements and best practices☆60Updated 2 weeks ago
- Collection of example YARA-L rules for use within Google Security Operations☆471Updated 2 months ago
- Helm charts for running open source digital forensic tools in Kubernetes☆181Updated this week
- OASIS TC Open Repository: TAXII 2 Client Library Written in Python☆120Updated last year
- Splunk Operator for Kubernetes☆249Updated last week
- ☆43Updated 3 weeks ago
- Translate an ECS mapping CSV to starter pipelines for Beats, Elasticsearch or Logstash☆54Updated 3 years ago
- Phantom Apps Repo☆82Updated 4 years ago
- Kestrel threat hunting language: building reusable, composable, and shareable huntflows across different data sources and threat intel.☆324Updated last year
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆53Updated this week
- Sublime rules for email attack detection, prevention, and threat hunting.☆344Updated last week
- OSSEM Data Dictionaries☆65Updated last year
- An IDE and translation engine for detection engineers and threat hunters. Be faster, write smarter, keep 100% privacy.☆172Updated 2 months ago
- Wazuh - Tools for packages creation☆113Updated last year
- ☆38Updated this week