jmpsec / osctrlLinks
Fast and efficient osquery management
☆483Updated 2 weeks ago
Alternatives and similar repositories for osctrl
Users that are interested in osctrl are comparing it to the libraries listed below
Sorting:
- A repository for using osquery for incident detection and response☆877Updated 4 months ago
- Manage, monitor and improve your cyber security posture.☆93Updated 2 years ago
- Security event correlation engine for ELK stack☆446Updated last year
- Production-ready detection & response queries for osquery☆597Updated 5 months ago
- Transform Linux Audit logs for SIEM usage☆809Updated last month
- Mapping the MITRE ATT&CK Matrix with Osquery☆807Updated 2 years ago
- ⚡️ Catalyst is a self-hosted, open source incident response platform and ticket system that helps to automate alert handling and incident…☆501Updated last week
- Osquery Resources☆63Updated 6 years ago
- Osquery launcher, autoupdater, and packager☆534Updated this week
- Web Based Event Viewer (GUI) for Suricata EVE Events in Elastic Search☆478Updated last week
- PatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform☆248Updated this week
- osquery extensions by Trail of Bits☆268Updated 2 years ago
- PatrOwl - Open Source, Smart and Scalable Security Operations Orchestration Platform☆638Updated last week
- Real-time, container-based file scanning at enterprise scale☆969Updated this week
- Jimi is an automation first no-code platform designed and developed originally for Security Orchestration and Response. Since its launch …☆168Updated last year
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆449Updated this week
- Sagan is a multi-threads, high performance log analysis engine. At it's core, Sagan similar to Suricata/Snort but with logs rather th…☆189Updated 3 months ago
- 🚌 Threat Bus – A threat intelligence dissemination layer for open-source security tools.☆269Updated 2 years ago
- Open source endpoint agent providing host information to Zeek. [v2]☆90Updated last month
- A standard for reducing log volume without sacrificing analytical capability☆213Updated 10 months ago
- Cyber Defence Monitoring Course Suite :: Suricata, Arkime (and others in the past)☆108Updated last year
- Scirius is a web application for Suricata ruleset management and threat hunting.☆672Updated 3 weeks ago
- Graph platform for Detection and Response☆702Updated 3 years ago
- Built-in Panther detection rules and policies☆433Updated this week
- A Linux Auditd rule set mapped to MITRE's Attack Framework☆823Updated 5 years ago
- An open standard for hashing network flows into identifiers, a.k.a "Community IDs".☆192Updated last year
- Documentation of Cortex☆174Updated 2 years ago
- an osquery fleet manager☆620Updated 3 years ago
- The tool for updating your Suricata rules.☆288Updated 2 months ago
- HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints…☆544Updated 8 months ago