ipworkx / ecs-suricataLinks
☆12Updated 5 years ago
Alternatives and similar repositories for ecs-suricata
Users that are interested in ecs-suricata are comparing it to the libraries listed below
Sorting:
- Threat Intelligence with Elastic - Minemeld integration with Elasticsearch☆19Updated 4 years ago
- Alert notification plugin for Graylog to generate log messages from alerts☆26Updated 2 months ago
- Suricata rule and intel index☆33Updated 3 weeks ago
- Mass Suricata rules creator, from a list of domain☆14Updated 7 years ago
- collector/runner☆65Updated 2 months ago
- An Ansible playbook for deploying the Suricata intrusion detection system and fetching Snort rules with Oinkmaster.☆17Updated 4 years ago
- Kibana 6 Templates for Suricata IDPS Threat Hunting☆24Updated 6 years ago
- A Yara Lua output script for Suricata☆20Updated 6 years ago
- Parse wazuh[HIDS] alerts into ECS mapping using Filebeat☆28Updated 5 years ago
- Mapping Corelight or Zeek data to Elastic Common Schema fields☆34Updated 3 weeks ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago
- Community-based CybergON-powered Suricata rules☆12Updated 3 years ago
- Cyber Defence Monitoring Course Suite :: Suricata, Arkime (and others in the past)☆107Updated last year
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆38Updated 3 years ago
- Meer (GPLv2) is a dedicated "spooler" for the Suricata & Sagan EVE output formats.☆23Updated 4 years ago
- The OTX Suricata Rule Generator can be used to create the rules and configuration for Suricata to alert on indicators from your OTX accou…☆112Updated last year
- Templates for Kibana/Logstash to use with Suricata IDPS☆81Updated 9 years ago
- Corelight-Ansible-Roles are a collection of Ansible Roles and playbooks that install, configure, run and manage a variety of Corelight, S…☆16Updated 4 years ago
- ☆35Updated last year
- ansible role to setup MISP, Malware Information Sharing Platform & Threat Sharing☆54Updated last week
- Expandable Defensive Cyber Operations Platform☆43Updated 3 years ago
- A shell script to download malware domains from various sources, and configuring unbound DNS config file to be used as a local recursive …☆19Updated 11 years ago
- ☆35Updated 4 years ago
- Suricata rules to detect Winnti communication☆16Updated 7 years ago
- Zeek support for Community ID flow hashing.☆37Updated 2 years ago
- brostash: Linux distribution based on Debian and focusing on network security events collection☆34Updated 5 years ago
- Alert condition plugin for Graylog to perform aggregation☆21Updated 2 years ago
- server for indexing and querying passive DNS observations☆49Updated last week
- How to Zeek Sysmon Logs!☆103Updated 3 years ago
- RPM packages for MISP☆37Updated last week