lamw / vcenter-authn-authz-log-examplesLinks
Log examples of vCenter Server Authentication & Authorization activities
☆17Updated 6 years ago
Alternatives and similar repositories for vcenter-authn-authz-log-examples
Users that are interested in vcenter-authn-authz-log-examples are comparing it to the libraries listed below
Sorting:
- Ansible role to install auditbeat for security monitoring. (Ruleset included)☆15Updated last year
- Suricata Language Server is an implementation of the Language Server Protocol for Suricata signatures. It adds syntax check, hints and au…☆71Updated 2 weeks ago
- Wazuh - Splunk App☆55Updated 8 months ago
- Threat Intelligence with Elastic - Minemeld integration with Elasticsearch☆19Updated 4 years ago
- A Sigma to Wazuh / OSSEC converter including a generated Windows Sysmon ruleset☆33Updated 4 years ago
- collector/runner☆65Updated 2 months ago
- Look into EDR events from network☆23Updated last month
- SIGMA UI is a free open-source application based on the Elastic stack and Sigma Converter (sigmac)☆188Updated 4 years ago
- Kibana 7 Templates for Suricata IDPS Threat Hunting☆40Updated 2 years ago
- Alert notification plugin for Graylog to generate log messages from alerts☆25Updated last month
- Example Suricata rules implementing some of my detection tactics☆20Updated 2 years ago
- Our collection of Wazuh detection rules for our Offense Lab☆14Updated 3 years ago
- Anything Sysmon related from the MSTIC R&D team☆153Updated 11 months ago
- Convert pcap files into richly-typed ZNG summary logs (Zeek, Suricata, and more)☆81Updated last month
- A community event for security researchers to share their favorite notebooks☆107Updated last year
- CIS Benchmark Audit Scripts☆24Updated 7 years ago
- ☆53Updated 6 years ago
- Converts Netwitness log parser configuration to Logstash configuration☆20Updated 4 years ago
- Kibana 6 Templates for Suricata IDPS Threat Hunting☆24Updated 6 years ago
- Corelight-Ansible-Roles are a collection of Ansible Roles and playbooks that install, configure, run and manage a variety of Corelight, S…☆16Updated 3 years ago
- Parse wazuh[HIDS] alerts into ECS mapping using Filebeat☆27Updated 4 years ago
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆35Updated 2 years ago
- ☆15Updated 7 years ago
- Threat Hunting with ELK Workshop (InfoSecWorld 2017)☆66Updated 7 years ago
- Generic Signature Format for SIEM Systems☆17Updated last year
- Run Velociraptor on Security Onion☆37Updated 2 years ago
- PowerShell scripts for fast Windows Event Collector configuration with Palantir toolset☆22Updated 3 years ago
- PANW Firewall Visualisations using Elastic Stack☆91Updated 2 years ago
- Attack Range to test detection against nativel serverless cloud services and environments☆35Updated 3 years ago
- Convert Sigma rules to Wazuh rules☆65Updated last year