guillain / LogStash-confLinks
Configuration of LogStash (and Filebeat) for Analytics treatment.
☆15Updated 6 years ago
Alternatives and similar repositories for LogStash-conf
Users that are interested in LogStash-conf are comparing it to the libraries listed below
Sorting:
- Kibana 7 Templates for Suricata IDPS Threat Hunting☆40Updated 2 years ago
- Threat Intelligence with Elastic - Minemeld integration with Elasticsearch☆19Updated 4 years ago
- Wazuh - Splunk App☆55Updated 8 months ago
- Contains log samples and configuration files for the Tactical Data Handling at Scale with Logstash course☆10Updated 5 years ago
- Ansible Playbook to install the ELK Stack☆43Updated 4 years ago
- A tool to assess the compliance of a VMware vSphere environment against the CIS Benchmark.☆51Updated 2 years ago
- ☆13Updated 3 years ago
- Our collection of Wazuh detection rules for our Offense Lab☆14Updated 3 years ago
- An Ansible playbook for deploying the Suricata intrusion detection system and fetching Snort rules with Oinkmaster.☆15Updated 3 years ago
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆95Updated 4 years ago
- ☆13Updated last year
- Create machine images containing the Nessus vulnerability scanner☆13Updated 2 weeks ago
- Vulnerability Assessment Module - OpenVas with Elastic stack using VulnWhisperer☆19Updated 5 years ago
- Alert notification plugin for Graylog to generate log messages from alerts☆25Updated last month
- Hikeshi is a security incident response application that keeps documenting incidents simple, so you can focus on fighting fires.☆20Updated 2 years ago
- FIles and guides related to using Elasticstack as a SIEM☆12Updated 5 years ago
- ☆21Updated 3 years ago
- ☆17Updated 5 years ago
- Repo for Automations and other solutions for Elastic SIEM/Security.☆18Updated 3 years ago
- Example Suricata rules implementing some of my detection tactics☆20Updated 2 years ago
- Collection of Suricata rule sets that I use modified to my environments.☆39Updated 4 years ago
- Declare and keep up a rogue default-gateway in Cisco's HSRP default configuration☆18Updated 8 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated 7 months ago
- A tool to convert Windows evtx files (Windows Event Log Files) into JSON format and log to Splunk (optional) using HTTP Event Collector.☆55Updated 3 years ago
- Kibana 6 Templates for Suricata IDPS Threat Hunting☆24Updated 6 years ago
- Sysmon and wazuh integration with Sigma sysmon rules [updated]☆66Updated 3 years ago
- SIEM USE Case Selection Methodology☆16Updated 4 years ago
- Automated CIS Benchmark Compliance Audit for Windows Server 2016 with Ansible & GOSS☆8Updated last year
- Cisco AMP threat hunting scripts☆14Updated 7 months ago
- collector/runner☆65Updated 2 months ago