josh-thurston / easyELK
Installation script for ELK stack to make life easy.
☆69Updated 4 years ago
Alternatives and similar repositories for easyELK:
Users that are interested in easyELK are comparing it to the libraries listed below
- Ansible Playbook to install the ELK Stack☆41Updated 4 years ago
- Sysmon and wazuh integration with Sigma sysmon rules [updated]☆62Updated 3 years ago
- elasticsearch, logstash and kibana configuration for pi-hole visualiziation☆205Updated 2 years ago
- Wazuh - Splunk App☆51Updated 4 months ago
- Collection of walkthroughs on various threat hunting techniques☆75Updated 4 years ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆68Updated last year
- ☆29Updated 3 years ago
- Threat Hunting with ELK Workshop (InfoSecWorld 2017)☆66Updated 7 years ago
- Elastic Beat for fetching and shipping Office 365 audit events☆66Updated 4 years ago
- Create alerts in The Hive from your Graylog alerts, to be turned into Hive cases.☆44Updated 4 years ago
- A Ruleset to enhance detection capabilities of Ossec using Sysmon☆87Updated 2 years ago
- ☆15Updated 2 years ago
- ☆27Updated 4 years ago
- ☆34Updated 3 years ago
- Useful scripts for those administering Wazuh☆79Updated 2 weeks ago
- Cisco eStreamer client☆25Updated 2 years ago
- ☆17Updated 2 years ago
- Provides detection capabilities and log conversion to evtx or syslog capabilities☆52Updated 2 years ago
- Parse wazuh[HIDS] alerts into ECS mapping using Filebeat☆27Updated 4 years ago
- automate your MISP installs☆66Updated 4 years ago
- All-in-one bundle of MISP, TheHive and Cortex☆170Updated 2 years ago
- Ingest Nessus files into Elasticsearch using PowerShell!☆20Updated 9 months ago
- Beats for Raspberry Pi / ARM☆84Updated 3 years ago
- Run Velociraptor on Security Onion☆37Updated 2 years ago
- Security Onion + Automation + Response Lab including n8n and Velociraptor☆106Updated 2 years ago
- ☆77Updated 5 years ago
- The Project can be used to integrate QRadar with MISP Threat Sharing Platform☆39Updated 2 years ago
- SOC Workflow App helps Security Analysts and Threat Hunters explore suspicious events, look into raw events arriving at the Elastic Stack…☆94Updated 2 years ago
- Kibana 7 Templates for Suricata IDPS Threat Hunting☆40Updated 2 years ago
- Snorpy is a python script the gives a Gui interface to help those new to snort create rules.☆60Updated 5 months ago