RELK -- The Research Elastic Stack (Kafka, Beats, Zookeeper, Logstash, ElasticSearch, Kibana, Spark, & Jupyter -- All in Docker)
☆27Nov 7, 2019Updated 6 years ago
Alternatives and similar repositories for RELK
Users that are interested in RELK are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- pocket guide for core threat hunting concepts☆23May 6, 2020Updated 5 years ago
- Kibana app for RedELK☆18Mar 19, 2023Updated 3 years ago
- FSL Test bench - Ansible playbook repository to setup a save environment for security auditing and testing. It can be used for teaching s…☆30Nov 26, 2024Updated last year
- Example of a serverless web reconaissance workflow's AWS architecture.☆11Feb 25, 2023Updated 3 years ago
- Telegram bot for the Lockdoor Framework☆14Dec 15, 2019Updated 6 years ago
- A script to create and assign SOP tasks into the cases☆20Aug 16, 2020Updated 5 years ago
- PTF-based data plane tests for ONOS fabric.p4☆15Aug 6, 2021Updated 4 years ago
- Utilizing your Threat data from a MISP instance into CarbonBlack Response by exposing the data in the Threat Intelligence Feed.☆20May 25, 2022Updated 3 years ago
- Python-based utility that uses supervised machine learning to detect phishing domains from the Certificate Transparency log network.☆327Sep 11, 2024Updated last year
- Using QRadar API☆20Feb 23, 2018Updated 8 years ago
- A collection of Indicators of Compromise (IoCs), most aligning with samples derived from the signatures in the YARA-Signatures repo☆29Jun 11, 2020Updated 5 years ago
- Manticore Adversary Emulation Cli☆47Aug 4, 2020Updated 5 years ago
- ☆10Dec 28, 2015Updated 10 years ago
- JSON-based DSLs are not for humans..☆10Sep 4, 2014Updated 11 years ago
- This repository provides tools to fight against Emotet malware. You can protect your system using these tools☆24Jan 24, 2020Updated 6 years ago
- Provides detection capabilities and log conversion to evtx or syslog capabilities☆55Jul 1, 2022Updated 3 years ago
- ☆34Updated this week
- ☆15Nov 29, 2017Updated 8 years ago
- Yara rules I've written☆10Dec 9, 2015Updated 10 years ago
- snake-core - the real snake☆15Jul 11, 2023Updated 2 years ago
- A scalable framework for binary analysis in a containered environment.☆13May 20, 2019Updated 6 years ago
- Real-time Packet Observation Tool☆39Sep 26, 2023Updated 2 years ago
- Finds dynamic DNS (like no-ip.org) domains from a given list of domains☆14Sep 17, 2015Updated 10 years ago
- A solution for using the ElastiFlow Unified Collector with the Elastic Stack (Elasticsearch and Kibana).☆26Nov 10, 2025Updated 4 months ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 11 years ago
- Windows login backdoor diagnostic tool☆11Apr 2, 2017Updated 8 years ago
- Realizes to write macros in any scripts into any languages.☆23Mar 20, 2017Updated 9 years ago
- Nemesis agent for Mythic☆28Dec 11, 2025Updated 3 months ago
- ☆13Aug 11, 2018Updated 7 years ago
- PcapMonkey will provide an easy way to analyze pcap using the latest version of Suricata and Zeek.☆165Updated this week
- ☆11Sep 13, 2025Updated 6 months ago
- ☆33Oct 16, 2025Updated 5 months ago
- Some rules, scripts of some use to us☆11Oct 25, 2024Updated last year
- This little script for gathering chaos.projectdiscovery.io recon data in an organized way and finding the daily differences on it☆18Aug 9, 2020Updated 5 years ago
- This repository contains advanced threat hunting scripts for Cisco Secure Endpoint API. The scripts leverage the AMP API to hunt for thre…☆14Jun 28, 2025Updated 8 months ago
- Automated phishing catcher☆12Nov 27, 2025Updated 3 months ago
- DFIR notebooks GCIH Gold project, paper☆12Apr 30, 2015Updated 10 years ago
- Static and Dynamic exploit analysis framework.☆23Jul 14, 2014Updated 11 years ago
- event shipper for Carbon Black Defense notifications☆10Feb 25, 2023Updated 3 years ago