guillain / LogStash-confLinks
Configuration of LogStash (and Filebeat) for Analytics treatment.
☆15Updated 7 years ago
Alternatives and similar repositories for LogStash-conf
Users that are interested in LogStash-conf are comparing it to the libraries listed below
Sorting:
- Kibana 7 Templates for Suricata IDPS Threat Hunting☆41Updated 2 years ago
- The PCAP Analyzer for Splunk includes useful Dashboards to analyze network packet capture files from Wireshark or Network Monitor (.pcap)…☆43Updated last year
- Threat Intelligence with Elastic - Minemeld integration with Elasticsearch☆19Updated 4 years ago
- Wazuh - Splunk App☆55Updated 10 months ago
- A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the…☆62Updated 2 years ago
- CIS Benchmark Audit Scripts☆24Updated 7 years ago
- Ansible Playbook to install the ELK Stack☆43Updated 5 years ago
- Sysmon and wazuh integration with Sigma sysmon rules [updated]☆68Updated 4 years ago
- Snort IDS/IPS log analytics using the Elastic Stack.☆86Updated 4 years ago
- Alert notification plugin for Graylog to generate log messages from alerts☆25Updated last month
- collector/runner☆65Updated 4 months ago
- Installation script for ELK stack to make life easy.☆69Updated 5 years ago
- Ansible CentOS 7 - CIS Benchmark Hardening Script☆89Updated 4 years ago
- Our collection of Wazuh detection rules for our Offense Lab☆15Updated 3 years ago
- Ansible role to install auditbeat for security monitoring. (Ruleset included)☆16Updated last year
- Generate syslog messages to test logging solutions.☆57Updated last year
- Parse wazuh[HIDS] alerts into ECS mapping using Filebeat☆27Updated 5 years ago
- Kibana 6 Templates for Suricata IDPS Threat Hunting☆24Updated 6 years ago
- ☆55Updated this week
- Ansible Playbooks for Security Automation with Ansible2 book☆102Updated 7 years ago
- Vulnerability Assessment Module - OpenVas with Elastic stack using VulnWhisperer☆19Updated 6 years ago
- OwlH Master API☆24Updated 3 months ago
- A Sigma to Wazuh / OSSEC converter including a generated Windows Sysmon ruleset☆33Updated 5 years ago
- Example Suricata rules implementing some of my detection tactics☆21Updated 2 years ago
- Collection of Suricata rule sets that I use modified to my environments.☆39Updated 4 years ago
- An Ansible playbook for deploying the Suricata intrusion detection system and fetching Snort rules with Oinkmaster.☆16Updated 3 years ago
- tshark + ELK analytics virtual machine☆69Updated 6 months ago
- Palo Alto Networks Rule Parser☆16Updated 8 years ago
- ☆38Updated 5 years ago
- A Ruleset to enhance detection capabilities of Ossec using Sysmon☆94Updated 3 years ago