insightlake / Data-SecurityLinks
Enterprise Data Loss Prevention - Profile, Classify, Protect Enterprise Data
☆26Updated 3 years ago
Alternatives and similar repositories for Data-Security
Users that are interested in Data-Security are comparing it to the libraries listed below
Sorting:
- A privacy and security engineering toolkit: Discover, understand, pseudonymize, anonymize, encrypt and securely share sensitive and perso…☆121Updated last year
- ☆119Updated 11 years ago
- A robust, and flexible open source User & Entity Behavior Analytics (UEBA) framework used for Security Analytics. Developed with luv by D…☆463Updated last year
- Machine Learning WAF Based☆96Updated 5 years ago
- WAFBench (wb) is a tool to measure the performance of WAF(Web Application Firewall) . It's based on latest code of ab (ApacheBench), and …☆112Updated 3 years ago
- Mirror of https://github.com/zeek/zeek☆176Updated 2 years ago
- Suricata rules for the new critical vulnerabilities☆84Updated 4 years ago
- Suricata IDS/IPS log analytics using the Elastic Stack.☆240Updated 4 years ago
- Open Source Security Information and event Management☆105Updated 10 years ago
- Security event correlation engine for ELK stack☆447Updated last year
- gonids is a library to parse IDS rules, with a focus primarily on Suricata rule compatibility. There is a discussion forum available that…☆190Updated 4 months ago
- ☆188Updated last week
- Mapping the MITRE ATT&CK Matrix with Osquery☆804Updated 2 years ago
- Open Source SIEM (Security Information and Event Management system).☆221Updated 2 years ago
- Suricata安装部署&丢包优 化&性能调优&规则调整&Pfring设置☆143Updated 6 years ago
- A curated Cyber "Security Orchestration, Automation and Response (SOAR)" awesome list.☆908Updated last year
- Scirius is a web application for Suricata ruleset management and threat hunting.☆668Updated 3 months ago
- NVD, Ubuntu, Alpine☆443Updated this week
- Suricata rules for network anomaly detection☆177Updated 2 weeks ago
- An open source data loss prevention solution.☆98Updated 11 years ago
- suricata IDS的规则,测试在用的,部分自写的规则视情况放出。☆18Updated 6 years ago
- The GOSINT framework is a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs).☆550Updated 2 years ago
- Open Source Data Protection/Privacy Regulatory Mapping Project☆188Updated 2 years ago
- Elemental - An ATT&CK Threat Library☆320Updated 3 years ago
- Useful resources for Zeek(https://zeek.org/) (Bro(http://bro.org/))☆31Updated 5 years ago
- Suricata, Snort and Zeek IDS rule and pcap testing system☆508Updated last week
- A utility to safely generate malicious network traffic patterns and evaluate controls.☆1,344Updated last year
- Extract and aggregate threat intelligence.☆890Updated last year
- Client and Gateway Modules for Software Defined Perimeter (SDP)☆90Updated 3 years ago
- Apache Metron Workshop Lab materials and instructions.☆35Updated 6 years ago