insightlake / Data-SecurityLinks
Enterprise Data Loss Prevention - Profile, Classify, Protect Enterprise Data
☆26Updated 3 years ago
Alternatives and similar repositories for Data-Security
Users that are interested in Data-Security are comparing it to the libraries listed below
Sorting:
- A privacy and security engineering toolkit: Discover, understand, pseudonymize, anonymize, encrypt and securely share sensitive and perso…☆120Updated last year
- A robust, and flexible open source User & Entity Behavior Analytics (UEBA) framework used for Security Analytics. Developed with luv by D…☆454Updated last year
- Machine Learning WAF Based☆95Updated 4 years ago
- ☆116Updated 11 years ago
- Suricata rules for the new critical vulnerabilities☆83Updated 4 years ago
- Open Source Data Protection/Privacy Regulatory Mapping Project☆186Updated 2 years ago
- Suricata IDS/IPS log analytics using the Elastic Stack.☆239Updated 4 years ago
- Useful resources for Zeek(https://zeek.org/) (Bro(http://bro.org/))☆31Updated 5 years ago
- WAFBench (wb) is a tool to measure the performance of WAF(Web Application Firewall) . It's based on latest code of ab (ApacheBench), and …☆111Updated 3 years ago
- Suricata安装部署&丢包优化&性能调优&规则调整&Pfring设置☆143Updated 5 years ago
- Mirror of https://github.com/zeek/zeek☆176Updated 2 years ago
- Open Source Security Information and event Management☆102Updated 10 years ago
- ☆39Updated last year
- gonids is a library to parse IDS rules, with a focus primarily on Suricata rule compatibility. There is a discussion forum available that…☆187Updated 2 months ago
- ☆30Updated 2 years ago
- Control Module for Software Defined Perimeter (SDP)☆89Updated 4 years ago
- Convert pcap files into richly-typed ZNG summary logs (Zeek, Suricata, and more)☆88Updated 5 months ago
- A curated Cyber "Security Orchestration, Automation and Response (SOAR)" awesome list.☆891Updated last year
- Scirius is a web application for Suricata ruleset management and threat hunting.☆667Updated last month
- Collection of various open-source an commercial rulesets for NIDS (especially for Suricata and Snort)☆28Updated 2 years ago
- Suricata Verification Tests - Testing Suricata Output☆114Updated last week
- Configuring the Suricata IDS to detect DoS attacks by adding custom rule file.☆40Updated 5 years ago
- The tool for updating your Suricata rules.☆280Updated last week
- Suricata rules for network anomaly detection☆173Updated 5 months ago
- Elemental - An ATT&CK Threat Library☆319Updated 2 years ago
- ☆84Updated 4 years ago
- ☆57Updated last year
- Open Source SIEM (Security Information and Event Management system).☆220Updated 2 years ago
- Repository of creating different example suricata data sets☆36Updated 6 years ago
- Mapping the MITRE ATT&CK Matrix with Osquery☆801Updated 2 years ago