☆12Apr 23, 2020Updated 5 years ago
Alternatives and similar repositories for ecs-suricata
Users that are interested in ecs-suricata are comparing it to the libraries listed below
Sorting:
- ☆12Jan 28, 2020Updated 6 years ago
- A solution for using the ElastiFlow Unified Collector with the Elastic Stack (Elasticsearch and Kibana).☆25Nov 10, 2025Updated 4 months ago
- ☆16Aug 9, 2025Updated 7 months ago
- Parse pfSense/OPNSense logs using Logstash, GeoIP tag entities, add additional context to logs, then send to Azure Sentinel for analysis.☆31Feb 28, 2022Updated 4 years ago
- A LDAP proxy to authenticate BMCs☆24Aug 18, 2022Updated 3 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Sep 17, 2019Updated 6 years ago
- Digital forensics for Google Drive—done right. Identify, preserve, and document cloud evidence with hash verification, timeline reconstru…☆26Dec 8, 2025Updated 3 months ago
- Automatically create iSCSI targets for all drives except for a boot device☆25May 23, 2025Updated 9 months ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Apr 18, 2020Updated 5 years ago
- Ansible playbook automation for pfelk☆23Jan 11, 2022Updated 4 years ago
- Documentation for ROCK NSM☆27Apr 7, 2021Updated 4 years ago
- Community-based CybergON-powered Suricata rules☆12Jul 5, 2022Updated 3 years ago
- Logstash server configs and extended patterns☆27Sep 19, 2014Updated 11 years ago
- Download a copy of your Garmin Connect data, including stats and GPX tracks.☆16Sep 7, 2017Updated 8 years ago
- Quick and Dirty full-connect scanner. Meant for when `nmap -Pn -p-` is too slow☆20Jul 1, 2016Updated 9 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Jan 6, 2021Updated 5 years ago
- This repository contains a few examples of actions that can be added to rules within Elastic Security.☆24Feb 6, 2025Updated last year
- WEB渗透测试数据库☆10Sep 20, 2016Updated 9 years ago
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆38Mar 15, 2024Updated 2 years ago
- A guide on using Zimbra with Elastic Stack using centralized logging☆27Apr 26, 2023Updated 2 years ago
- Simple script to convert JSON to html or excel☆23Jun 10, 2020Updated 5 years ago
- LuaJIT FFI bindings to libinjection (https://github.com/client9/libinjection)☆16Sep 15, 2016Updated 9 years ago
- A simple pam account module to process HBAC rules stored on an IPA server☆10May 14, 2018Updated 7 years ago
- Suricata rules to detect Winnti communication☆16Mar 5, 2018Updated 8 years ago
- it's quite self explanatory: a crawler with sqlmap☆13Jul 13, 2017Updated 8 years ago
- Mikrotik's Winbox in a docker container accessible via noVNC through a web browser.☆13May 12, 2025Updated 10 months ago
- The Avalanche Platform Go Library☆11May 3, 2021Updated 4 years ago
- Bash Completion File for Zimbra☆17Feb 9, 2016Updated 10 years ago
- Mass Suricata rules creator, from a list of domain☆14Sep 14, 2018Updated 7 years ago
- ipip.net(17MonIP) parsing library for OpenResty.☆12Jun 4, 2018Updated 7 years ago
- ☆11Nov 4, 2022Updated 3 years ago
- ☆13Dec 26, 2022Updated 3 years ago
- An Ansible playbook for deploying the Suricata intrusion detection system and fetching Snort rules with Oinkmaster.☆17Oct 30, 2021Updated 4 years ago
- The website for arkime.com☆24Updated this week
- A Zimbra extension that allows the user to monitor their recent login and account activity. This is important to keep the user's account …☆21Jan 11, 2025Updated last year
- SWF Vulnerability & Information Scanner☆18Nov 24, 2018Updated 7 years ago
- fiber middleware to automatically generate RESTful API documentation with Swagger 2.0.☆13Jun 14, 2023Updated 2 years ago
- fast, extensible, versatile event router for Suricata's EVE-JSON format☆57Nov 20, 2025Updated 4 months ago
- Openvpn client in a docker container.☆11Nov 5, 2024Updated last year