jmpsec / osctrlLinks
Fast and efficient osquery management
☆472Updated last week
Alternatives and similar repositories for osctrl
Users that are interested in osctrl are comparing it to the libraries listed below
Sorting:
- A repository for using osquery for incident detection and response☆870Updated 3 months ago
- Osquery launcher, autoupdater, and packager☆534Updated this week
- Manage, monitor and improve your cyber security posture.☆93Updated 2 years ago
- Security event correlation engine for ELK stack☆447Updated last year
- Transform Linux Audit logs for SIEM usage☆804Updated 2 months ago
- Production-ready detection & response queries for osquery☆594Updated 3 months ago
- PatrOwl - Open Source, Smart and Scalable Security Operations Orchestration Platform☆639Updated this week
- Web Based Event Viewer (GUI) for Suricata EVE Events in Elastic Search☆473Updated this week
- Mapping the MITRE ATT&CK Matrix with Osquery☆803Updated 2 years ago
- osquery extensions by Trail of Bits☆267Updated 2 years ago
- PatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform☆248Updated last week
- Osquery Resources☆63Updated 6 years ago
- ⚡️ Catalyst is a self-hosted, open source incident response platform and ticket system that helps to automate alert handling and incident…☆494Updated 2 weeks ago
- Real-time, container-based file scanning at enterprise scale☆961Updated last month
- an osquery fleet manager☆619Updated 3 years ago
- 🚌 Threat Bus – A threat intelligence dissemination layer for open-source security tools.☆267Updated 2 years ago
- An open standard for hashing network flows into identifiers, a.k.a "Community IDs".☆189Updated last year
- Open source endpoint agent providing host information to Zeek. [v2]☆90Updated 2 weeks ago
- Jimi is an automation first no-code platform designed and developed originally for Security Orchestration and Response. Since its launch …☆168Updated last year
- Sagan is a multi-threads, high performance log analysis engine. At it's core, Sagan similar to Suricata/Snort but with logs rather th…☆190Updated 2 months ago
- A standard for reducing log volume without sacrificing analytical capability☆213Updated 9 months ago
- Wazuh - Ruleset☆492Updated last year
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆447Updated this week
- A Linux Auditd rule set mapped to MITRE's Attack Framework☆815Updated 5 years ago
- ☆55Updated 3 years ago
- HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints…☆542Updated 7 months ago
- Scirius is a web application for Suricata ruleset management and threat hunting.☆668Updated 3 months ago
- SIEM Logstash parsing for more than hundred technologies☆188Updated this week
- Automated deployment scripts for the RockNSM network hunting distribution.☆456Updated 2 years ago
- Tenzir is the data pipeline engine for security teams.☆709Updated this week