insightlake / Data-SecurityLinks
Enterprise Data Loss Prevention - Profile, Classify, Protect Enterprise Data
☆26Updated 3 years ago
Alternatives and similar repositories for Data-Security
Users that are interested in Data-Security are comparing it to the libraries listed below
Sorting:
- Machine Learning WAF Based☆96Updated 4 years ago
- A robust, and flexible open source User & Entity Behavior Analytics (UEBA) framework used for Security Analytics. Developed with luv by D…☆457Updated last year
- A privacy and security engineering toolkit: Discover, understand, pseudonymize, anonymize, encrypt and securely share sensitive and perso…☆120Updated last year
- Open Source Security Information and event Management☆103Updated 10 years ago
- ☆118Updated 11 years ago
- Suricata rules for the new critical vulnerabilities☆83Updated 4 years ago
- Security event correlation engine for ELK stack☆447Updated last year
- Mirror of https://github.com/zeek/zeek☆176Updated 2 years ago
- Suricata安装部署&丢包优化&性能调优&规则调整&Pfring设置☆142Updated 6 years ago
- A curated Cyber "Security Orchestration, Automation and Response (SOAR)" awesome list.☆891Updated last year
- WAFBench (wb) is a tool to measure the performance of WAF(Web Application Firewall) . It's based on latest code of ab (ApacheBench), and …☆111Updated 3 years ago
- gonids is a library to parse IDS rules, with a focus primarily on Suricata rule compatibility. There is a discussion forum available that…☆187Updated 3 months ago
- Open Source Data Protection/Privacy Regulatory Mapping Project☆186Updated 2 years ago
- Suricata IDS/IPS log analytics using the Elastic Stack.☆240Updated 4 years ago
- The tool for updating your Suricata rules.☆280Updated last month
- Mapping the MITRE ATT&CK Matrix with Osquery☆801Updated 2 years ago
- Collection of various open-source an commercial rulesets for NIDS (especially for Suricata and Snort)☆29Updated 2 years ago
- Useful resources for Zeek(https://zeek.org/) (Bro(http://bro.org/))☆31Updated 5 years ago
- Suricata, Snort and Zeek IDS rule and pcap testing system☆502Updated last month
- CISSP mind map, 8 domains, 2020 edition, OSG/AIO eighth edition, 8th☆76Updated 3 years ago
- ☆30Updated 2 years ago
- Scirius is a web application for Suricata ruleset management and threat hunting.☆666Updated last month
- Convert pcap files into richly-typed ZNG summary logs (Zeek, Suricata, and more)☆91Updated 6 months ago
- Suricata rules for network anomaly detection☆174Updated last week
- The OTX Suricata Rule Generator can be used to create the rules and configuration for Suricata to alert on indicators from your OTX accou…☆112Updated last year
- The GOSINT framework is a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs).☆548Updated 2 years ago
- Quickly generate suricata rules for IOCs☆28Updated 4 years ago
- Configuring the Suricata IDS to detect DoS attacks by adding custom rule file.☆40Updated 5 years ago
- Extract and aggregate threat intelligence.☆882Updated last year
- ☆39Updated last year