lguillaud / osd_transform_visLinks
OpenSearch-Dashboards plugin to create custom visualisations
☆25Updated 2 months ago
Alternatives and similar repositories for osd_transform_vis
Users that are interested in osd_transform_vis are comparing it to the libraries listed below
Sorting:
- ☆12Updated 5 years ago
- Mapping Corelight or Zeek data to Elastic Common Schema fields☆34Updated 3 months ago
- This repository contains a few examples of actions that can be added to rules within Elastic Security.☆24Updated last year
- Suricata Language Server is an implementation of the Language Server Protocol for Suricata signatures. It adds syntax check, hints and au…☆84Updated this week
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Updated 5 years ago
- Parse wazuh[HIDS] alerts into ECS mapping using Filebeat☆28Updated 5 years ago
- Decentralized Cyber Threat Intelligence Kaizen Framework☆27Updated 4 years ago
- Kestrel Jupyter Notebook Kernel☆10Updated 2 years ago
- Threat Intelligence with Elastic - Minemeld integration with Elasticsearch☆19Updated 4 years ago
- ☆35Updated 4 years ago
- Kibana 7 Templates for Suricata IDPS Threat Hunting☆43Updated last month
- Documentation used for Shuffle☆21Updated this week
- Corelight-Ansible-Roles are a collection of Ansible Roles and playbooks that install, configure, run and manage a variety of Corelight, S…☆16Updated 4 years ago
- Graph Representation of MITRE ATT&CK's CTI data☆51Updated 6 years ago
- Wazuh - Splunk App☆56Updated last year
- ☆18Updated 4 years ago
- Zeek package for tracking long connections to report them before they have completed.☆31Updated 2 months ago
- Log examples of vCenter Server Authentication & Authorization activities☆17Updated 6 years ago
- ☆14Updated 2 weeks ago
- Converts Netwitness log parser configuration to Logstash configuration☆20Updated 5 years ago
- DynamiteNSM is a free Network Security Monitor developed by Dynamite Analytics to enable network visibility and advanced cyber threat det…☆172Updated 2 years ago
- GPT-3 use cases for Cybersecurity☆53Updated 2 years ago
- Add POST body excerpt to Bro's HTTP log☆14Updated 2 months ago
- Collection of various open-source an commercial rulesets for NIDS (especially for Suricata and Snort)☆29Updated 2 years ago
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆38Updated 3 years ago
- CloudPathSniffer is an open-source, easy to use and extensible Cloud Anomaly Detection platform designed to help security teams to find h…☆13Updated 2 years ago
- Sankey diagram for Kibana visualize.☆32Updated last year
- Translate an ECS mapping CSV to starter pipelines for Beats, Elasticsearch or Logstash☆54Updated 3 years ago
- ☆53Updated last week
- Repository resource threat intelligence for SOC☆10Updated 7 years ago