insightlake / Data-Security
Enterprise Data Loss Prevention - Profile, Classify, Protect Enterprise Data
☆26Updated 2 years ago
Alternatives and similar repositories for Data-Security:
Users that are interested in Data-Security are comparing it to the libraries listed below
- ☆103Updated 10 years ago
- Open Source Security Information and event Management☆90Updated 9 years ago
- Suricata rules for the new critical vulnerabilities☆81Updated 4 years ago
- A robust, and flexible open source User & Entity Behavior Analytics (UEBA) framework used for Security Analytics. Developed with luv by D…☆423Updated last year
- zeek-scripts☆44Updated 6 years ago
- A privacy and security engineering toolkit: Discover, understand, pseudonymize, anonymize, encrypt and securely share sensitive and perso…☆119Updated 8 months ago
- WAFBench (wb) is a tool to measure the performance of WAF(Web Application Firewall) . It's based on latest code of ab (ApacheBench), and …☆109Updated 2 years ago
- Explore Indicators of Compromise Automatically☆94Updated 5 years ago
- Convert pcap files into richly-typed ZNG summary logs (Zeek, Suricata, and more)☆80Updated this week
- Suricata IDS/IPS log analytics using the Elastic Stack.☆238Updated 3 years ago
- The OTX Suricata Rule Generator can be used to create the rules and configuration for Suricata to alert on indicators from your OTX accou…☆110Updated last year
- Zeek IDS Dockerfile☆101Updated 2 years ago
- Quickly generate suricata rules for IOCs☆29Updated 3 years ago
- PatrowlHears - Vulnerability Intelligence Center / Exploits☆163Updated 2 weeks ago
- The GOSINT framework is a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs).☆543Updated last year
- Suricata安装部署&丢包优化&性能调优&规则调整&Pfring设置☆141Updated 5 years ago
- Machine Learning WAF Based☆94Updated 4 years ago
- Mirror of https://github.com/zeek/zeek☆174Updated 2 years ago
- Mapping NSM rules to MITRE ATT&CK☆71Updated 4 years ago
- ☆43Updated 2 years ago
- How to Zeek Sysmon Logs!☆101Updated 3 years ago
- Useful resources for Zeek(https://zeek.org/) (Bro(http://bro.org/))☆31Updated 5 years ago
- PatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform☆148Updated 3 years ago
- ☆95Updated 3 years ago
- Security event correlation engine for ELK stack☆439Updated 10 months ago
- Suricata rules for network anomaly detection☆160Updated last week
- An organizational asset and vulnerability management tool, with Jira integration, designed for generating application security reports.☆179Updated 2 weeks ago
- suricata IDS的规则,测试在用的,部分自写的规则视情况放出。☆18Updated 6 years ago
- gonids is a library to parse IDS rules, with a focus primarily on Suricata rule compatibility. There is a discussion forum available that…☆185Updated 2 years ago
- Open Source SIEM (Security Information and Event Management system).☆209Updated last year