j91321 / ansible-role-auditbeatLinks
Ansible role to install auditbeat for security monitoring. (Ruleset included)
☆16Updated last year
Alternatives and similar repositories for ansible-role-auditbeat
Users that are interested in ansible-role-auditbeat are comparing it to the libraries listed below
Sorting:
- Various blog post projects.☆25Updated 3 weeks ago
- collector/runner☆65Updated last month
- Spring Boot web application vulnerable to CVE-2021-44228, nicknamed Log4Shell.☆13Updated 3 years ago
- CIS Benchmark Audit Scripts☆24Updated 7 years ago
- Suricata Language Server is an implementation of the Language Server Protocol for Suricata signatures. It adds syntax check, hints and au…☆80Updated 2 weeks ago
- Look into EDR events from network☆23Updated 5 months ago
- Log examples of vCenter Server Authentication & Authorization activities☆17Updated 6 years ago
- Packer and vagrant scripts to automate building Windows and Linux machines on vCenter☆17Updated 6 years ago
- Docker container stack for GVM / OpenVAS☆48Updated 2 years ago
- A modern CLI for Tenable.io written in Go☆14Updated 4 years ago
- Docker Image packaging for OpenCVE☆48Updated 11 months ago
- Offensive Infrastructure with Modern Technologies☆91Updated 4 years ago
- Kibana 7 Templates for Suricata IDPS Threat Hunting☆43Updated 2 weeks ago
- A Beat that monitors a local Nessus reports directory and outputs scan results to Elasticsearch or Logstash.☆31Updated 8 years ago
- How to Zeek Sysmon Logs!☆102Updated 3 years ago
- Cyber Defence Monitoring Course Suite :: Suricata, Arkime (and others in the past)☆107Updated last year
- Protect your Cloud Native Applications running on Kubernetes from malicious attacks with pre-registered source code, pre-registered runti…☆57Updated 10 months ago
- Collection of Slides From My Conference Talks☆20Updated 2 years ago
- A Yara Lua output script for Suricata☆20Updated 6 years ago
- Scan your EC2 instance to find its vulnerabilities using Vuls (https://vuls.io/en/)☆89Updated 2 years ago
- Mirror - CIS Benchamarks☆41Updated 4 years ago
- ☆15Updated 6 years ago
- Ripple20 Critical Vulnerabilities - Detection Logic and Signatures☆12Updated 4 years ago
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆70Updated 3 years ago
- ☆12Updated 5 years ago
- A Docker Image For the Open Vulnerability Assessment Scanner (OpenVAS)☆20Updated 2 years ago
- Splunk scripted input for opening a backconnect shell on a remote forwarder☆45Updated 4 years ago
- Our collection of Wazuh detection rules for our Offense Lab☆16Updated 3 years ago
- An Ansible playbook for deploying the Suricata intrusion detection system and fetching Snort rules with Oinkmaster.☆17Updated 4 years ago
- attack2jira automates the process of standing up a Jira environment that can be used to track and measure ATT&CK coverage☆114Updated 2 years ago