josh-thurston / easyELK
Installation script for ELK stack to make life easy.
☆67Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for easyELK
- Ansible Playbook to install the ELK Stack☆40Updated 4 years ago
- Wazuh - Splunk App☆50Updated 2 months ago
- SIEM-From-Scratch is a drop-in ELK based SIEM component for your Vagrant infosec lab☆37Updated 4 years ago
- elasticsearch, logstash and kibana configuration for pi-hole visualiziation☆204Updated 2 years ago
- ☆27Updated 4 years ago
- Beats for Raspberry Pi / ARM☆84Updated 2 years ago
- Useful scripts for those administering Wazuh☆72Updated 3 months ago
- Run Velociraptor on Security Onion☆34Updated 2 years ago
- Sysmon and wazuh integration with Sigma sysmon rules [updated]☆61Updated 3 years ago
- All-in-one bundle of MISP, TheHive and Cortex☆169Updated 2 years ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆67Updated last year
- Elastic Beat for fetching and shipping Office 365 audit events☆66Updated 4 years ago
- ☆34Updated 3 years ago
- Run zeek with zeekctl in docker☆50Updated 2 months ago
- A curated list of awesome things related to TheHive & Cortex☆173Updated 3 years ago
- Designed to be installed on a fresh install of raspbian on a raspberry pi, by combining Respounder (Responder detection) and Artillery (p…☆34Updated 5 years ago
- Create alerts in The Hive from your Graylog alerts, to be turned into Hive cases.☆44Updated 4 years ago
- A Ruleset to enhance detection capabilities of Ossec using Sysmon☆87Updated 2 years ago
- Threat Hunting with ELK Workshop (InfoSecWorld 2017)☆66Updated 7 years ago
- This repository was created to aid in the deployment/maintenance of the Sysmon service on a large number of computers.☆82Updated last year
- ☆48Updated this week
- Unofficial third-party scripts, playbooks, and content for IBM QRadar & QRadar Community Edition.☆78Updated 3 months ago
- Collection of walkthroughs on various threat hunting techniques☆75Updated 4 years ago
- SOC Workflow App helps Security Analysts and Threat Hunters explore suspicious events, look into raw events arriving at the Elastic Stack…☆92Updated 2 years ago
- ☆29Updated 3 years ago
- automate your MISP installs☆66Updated 4 years ago
- OpenIOC rules to facilitate hunting for indicators of compromise☆38Updated 2 years ago
- Technical add-on for Splunk related to TheHive/Cortex from TheHive project☆49Updated 3 weeks ago
- Docker configurations for TheHive, Cortex and 3rd party tools☆113Updated last year