j91321 / ansible-role-auditbeatLinks
Ansible role to install auditbeat for security monitoring. (Ruleset included)
☆16Updated 2 years ago
Alternatives and similar repositories for ansible-role-auditbeat
Users that are interested in ansible-role-auditbeat are comparing it to the libraries listed below
Sorting:
- CIS Benchmark Audit Scripts☆24Updated 8 years ago
- A modern CLI for Tenable.io written in Go☆14Updated 5 years ago
- Various blog post projects.☆25Updated last month
- Suricata Language Server is an implementation of the Language Server Protocol for Suricata signatures. It adds syntax check, hints and au…☆84Updated 3 weeks ago
- collector/runner☆64Updated 4 months ago
- Look into EDR events from network☆25Updated 2 months ago
- ☆15Updated 6 years ago
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆140Updated 11 months ago
- ☆12Updated 5 years ago
- An Ansible playbook for deploying the Suricata intrusion detection system and fetching Snort rules with Oinkmaster.☆17Updated 4 years ago
- A Beat that monitors a local Nessus reports directory and outputs scan results to Elasticsearch or Logstash.☆31Updated 8 years ago
- Threat Intelligence with Elastic - Minemeld integration with Elasticsearch☆19Updated 4 years ago
- Log examples of vCenter Server Authentication & Authorization activities☆17Updated 6 years ago
- Serverless honeytoken 🕵🏻♂️☆81Updated 3 years ago
- Corelight-Ansible-Roles are a collection of Ansible Roles and playbooks that install, configure, run and manage a variety of Corelight, S…☆16Updated 4 years ago
- Docker container stack for GVM / OpenVAS☆47Updated 2 years ago
- Official documentation for TheHive Project applications☆21Updated 2 years ago
- Scan your EC2 instance to find its vulnerabilities using Vuls (https://vuls.io/en/)☆89Updated 3 years ago
- A Yara Lua output script for Suricata☆20Updated 6 years ago
- Offensive Infrastructure with Modern Technologies☆91Updated 5 years ago
- How to Zeek Sysmon Logs!☆103Updated 3 years ago
- Protect your Cloud Native Applications running on Kubernetes from malicious attacks with pre-registered source code, pre-registered runti…☆58Updated last year
- Our collection of Wazuh detection rules for our Offense Lab☆17Updated 3 years ago
- Bro integration with osquery☆15Updated 2 years ago
- Alert notification plugin for Graylog to generate log messages from alerts☆27Updated last week
- Cyber Defence Monitoring Course Suite :: Suricata, Arkime (and others in the past)☆108Updated last year
- Example Suricata rules implementing some of my detection tactics☆22Updated 3 years ago
- Fun tools around the EBS Direct API☆19Updated 4 years ago
- Linux, macOS and Windows Install scripts for cnquery & cnspec☆83Updated this week
- Kibana 7 Templates for Suricata IDPS Threat Hunting☆43Updated 3 weeks ago