josh-thurston / easyBEATSView external linksLinks
Beats for Raspberry Pi / ARM
☆84Dec 29, 2021Updated 4 years ago
Alternatives and similar repositories for easyBEATS
Users that are interested in easyBEATS are comparing it to the libraries listed below
Sorting:
- Installation script for ELK stack to make life easy.☆69Apr 19, 2020Updated 5 years ago
- A Python SDK for Imperva SecureSphere Open API☆13Sep 21, 2023Updated 2 years ago
- OSSEM Modular☆27Jun 29, 2020Updated 5 years ago
- Collection of various materials on operational security.☆23Nov 15, 2016Updated 9 years ago
- Squid, ELK, K3s, RPI4 all in one☆18Mar 9, 2022Updated 3 years ago
- Corelight@Home script☆45Oct 5, 2023Updated 2 years ago
- GUI Automated trading bot for thinkorswim trading platform☆20Jun 1, 2020Updated 5 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Oct 14, 2020Updated 5 years ago
- A Vagrant file to spin up 3 instances of Ubuntu (based of GeerlingGuy's Ubuntu box), and then an Ansible playbook to install and configur…☆21Sep 10, 2020Updated 5 years ago
- ☆20Dec 6, 2022Updated 3 years ago
- 🌴 The STIX2 Pattern expression parser for humans☆26Jun 29, 2019Updated 6 years ago
- Files related to my Graylog home lab setup☆25Dec 5, 2024Updated last year
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident re…☆32Aug 29, 2016Updated 9 years ago
- A low/zero interaction ssh authentication logging honeypot☆25Feb 4, 2026Updated last week
- Code snippets I find useful☆32Sep 25, 2017Updated 8 years ago
- Practical Threat Detection Engineering, Published by Packt☆84Jul 3, 2023Updated 2 years ago
- A PowerShell tool which provides an easy way to check for shared passwords between Windows Active Directory accounts☆32Feb 12, 2019Updated 7 years ago
- IP-ASN-history is a server software to store efficiently the history of BGP announces and quickly lookup IP addresses origins☆45Apr 1, 2022Updated 3 years ago
- ☆78Jan 15, 2026Updated 3 weeks ago
- Mapping Corelight or Zeek data to Elastic Common Schema fields☆34Nov 3, 2025Updated 3 months ago
- Searches for Insider Threat Hunting☆30May 2, 2019Updated 6 years ago
- An application that displays a map and graphs showing solar irradiance forecasts in solar farms in Georgia using data from the National S…☆10Oct 15, 2021Updated 4 years ago
- KitsuneC2 is a cross-platform adversary emulation tool written in Go.☆12Oct 25, 2024Updated last year
- Tracks the ISS and when it is near your area it will send a tweet!☆12Feb 25, 2021Updated 4 years ago
- ssh user enumeration☆12Mar 21, 2023Updated 2 years ago
- KQL queries for Microsoft Defender Advanced Hunting organized around the TTPs of the MITRE ATT&CK framework.☆18Nov 7, 2024Updated last year
- On-Premises Open Cyber Threat Intelligence Platform☆11Oct 29, 2024Updated last year
- Cybersecurity Ontology (CyberOnto) and Situational Awareness (CyberSA) help teamwork in Cyber Incident Responses, Control, Containment, a…☆10Sep 15, 2022Updated 3 years ago
- A systemd-enabled Kali Linux Docker image, in the spirit of geerlingguy/docker-debian11-ansible.☆15Dec 31, 2025Updated last month
- Self service portal for aws workspace☆10Dec 10, 2023Updated 2 years ago
- This is a gui interface for airmon-ng☆14Mar 23, 2023Updated 2 years ago
- morphHTA - Morphing Cobalt Strike's evil.HTA☆10Jun 3, 2017Updated 8 years ago
- A generic Apigee proxy to give CRUD access to Firestore collections, to AppSheet Applications.☆12Nov 22, 2021Updated 4 years ago
- Engineering Guidance and Standards for the Home Office☆21Feb 4, 2026Updated last week
- A Jupyter notebook to assist with the analysis of the output generated from Volatility memory extraction framework.☆97May 28, 2023Updated 2 years ago
- ☆50Jan 30, 2026Updated 2 weeks ago
- This tool aims at parsing Microsoft Protection logs to provide relevant data to forensic analysts during incident responses.☆21Sep 30, 2022Updated 3 years ago
- ☆13Aug 18, 2023Updated 2 years ago
- ☆12Jan 22, 2026Updated 3 weeks ago