insightlake / Data-SecurityLinks
Enterprise Data Loss Prevention - Profile, Classify, Protect Enterprise Data
☆27Updated 3 years ago
Alternatives and similar repositories for Data-Security
Users that are interested in Data-Security are comparing it to the libraries listed below
Sorting:
- A privacy and security engineering toolkit: Discover, understand, pseudonymize, anonymize, encrypt and securely share sensitive and perso…☆120Updated last year
- A robust, and flexible open source User & Entity Behavior Analytics (UEBA) framework used for Security Analytics. Developed with luv by D…☆449Updated last year
- Machine Learning WAF Based☆94Updated 4 years ago
- Open Source Security Information and event Management☆101Updated 9 years ago
- Security event correlation engine for ELK stack☆444Updated last year
- Mirror of https://github.com/zeek/zeek☆176Updated 2 years ago
- Client and Gateway Modules for Software Defined Perimeter (SDP)☆90Updated 3 years ago
- ☆115Updated 11 years ago
- WAFBench (wb) is a tool to measure the performance of WAF(Web Application Firewall) . It's based on latest code of ab (ApacheBench), and …☆112Updated 3 years ago
- A curated Cyber "Security Orchestration, Automation and Response (SOAR)" awesome list.☆887Updated last year
- Suricata rules for the new critical vulnerabilities☆83Updated 4 years ago
- gonids is a library to parse IDS rules, with a focus primarily on Suricata rule compatibility. There is a discussion forum available that…☆186Updated 2 months ago
- Suricata IDS/IPS log analytics using the Elastic Stack.☆239Updated 4 years ago
- Open Source Data Protection/Privacy Regulatory Mapping Project☆186Updated 2 years ago
- Open Source SIEM (Security Information and Event Management system).☆218Updated 2 years ago
- Control Module for Software Defined Perimeter (SDP)☆89Updated 4 years ago
- Convert pcap files into richly-typed ZNG summary logs (Zeek, Suricata, and more)☆87Updated 4 months ago
- Suricata, Snort and Zeek IDS rule and pcap testing system☆495Updated this week
- CISSP mind map, 8 domains, 2020 edition, OSG/AIO eighth edition, 8th☆76Updated 3 years ago
- Suricata rules for network anomaly detection☆169Updated 5 months ago
- Scirius is a web application for Suricata ruleset management and threat hunting.☆664Updated last week
- LZR quickly detects and fingerprints unexpected services running on unexpected ports.☆182Updated 4 months ago
- Open source endpoint agent providing host information to Zeek. [v2]☆85Updated last week
- OASIS Cyber Threat Intelligence (CTI) TC: A repository for commonly used STIX objects in order to avoid needless duplication. https://gi…☆94Updated 3 months ago
- The GOSINT framework is a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs).☆548Updated 2 years ago
- ☆186Updated last week
- Extract and aggregate threat intelligence.☆882Updated last year
- The tool for updating your Suricata rules.☆280Updated 2 months ago
- Fast and efficient osquery management☆462Updated this week
- Apache Metron☆60Updated 4 years ago