guillain / LogStash-conf
Configuration of LogStash (and Filebeat) for Analytics treatment.
☆15Updated 6 years ago
Alternatives and similar repositories for LogStash-conf:
Users that are interested in LogStash-conf are comparing it to the libraries listed below
- Threat Intelligence with Elastic - Minemeld integration with Elasticsearch☆19Updated 3 years ago
- ☆13Updated 3 years ago
- An Ansible playbook for deploying the Suricata intrusion detection system and fetching Snort rules with Oinkmaster.☆15Updated 3 years ago
- Ansible role to install auditbeat for security monitoring. (Ruleset included)☆15Updated last year
- Ripple20 Critical Vulnerabilities - Detection Logic and Signatures☆12Updated 3 years ago
- Kibana 7 Templates for Suricata IDPS Threat Hunting☆40Updated 2 years ago
- A tool to assess the compliance of a VMware vSphere environment against the CIS Benchmark.☆49Updated 2 years ago
- SIEM-From-Scratch is a drop-in ELK based SIEM component for your Vagrant infosec lab☆36Updated 4 years ago
- Our collection of Wazuh detection rules for our Offense Lab☆13Updated 3 years ago
- ☆11Updated 3 years ago
- Wazuh - Splunk App☆52Updated 5 months ago
- Cisco AMP threat hunting scripts☆14Updated 4 months ago
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆95Updated 3 years ago
- Incident Response Plan for all major incidents including cheatsheets for both linux and windows☆14Updated 4 years ago
- Create machine images containing the Nessus vulnerability scanner☆12Updated last month
- MalwareAnalysis☆12Updated 4 years ago
- Collection of Suricata rule sets that I use modified to my environments.☆39Updated 4 years ago
- Pep up your Windows Event Collector (WEC) for Windows Event Forwarding (WEF)☆19Updated 3 years ago
- SIEM USE Case Selection Methodology☆16Updated 4 years ago
- PowerShell wrapper for nmap, allows easy scanning of many hosts and subnets☆17Updated 6 years ago
- Kerberoast Detection Script☆30Updated 4 months ago
- Example Suricata rules implementing some of my detection tactics☆20Updated 2 years ago
- Azure AD Incident Response☆25Updated 3 years ago
- Tool to check compliance with CIS Linux Benchmarks, specifically Distribution Independent, Debian 9 and Ubuntu 18.04 LTS, and generate sp…☆24Updated 4 years ago
- Sysmon Tools for PowerShell☆12Updated 6 years ago
- Various blog post projects.☆23Updated 8 months ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆53Updated 4 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Updated 4 years ago
- vSphere Security Audit Scripts, Based on the vSphere Hardening Guide.☆25Updated 4 years ago
- ☆30Updated 7 years ago