lmakonem / ELK-SIEM-Ansible-PlaybookLinks
Ansible Playbook to install the ELK Stack
☆43Updated 5 years ago
Alternatives and similar repositories for ELK-SIEM-Ansible-Playbook
Users that are interested in ELK-SIEM-Ansible-Playbook are comparing it to the libraries listed below
Sorting:
- Run Velociraptor on Security Onion☆39Updated 3 years ago
- Installation script for ELK stack to make life easy.☆69Updated 5 years ago
- ☆17Updated 2 years ago
- ☆89Updated this week
- Sysmon and wazuh integration with Sigma sysmon rules [updated]☆68Updated 4 years ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆71Updated 2 years ago
- Docker configurations for TheHive, Cortex and 3rd party tools☆126Updated 2 years ago
- ☆48Updated last week
- Run zeek with zeekctl in docker☆54Updated 10 months ago
- Wazuh - Splunk App☆55Updated 10 months ago
- ☆55Updated this week
- Security Onion + Automation + Response Lab including n8n and Velociraptor☆111Updated 2 years ago
- Threat Hunting with ELK Workshop (InfoSecWorld 2017)☆66Updated 7 years ago
- Useful scripts for those administering Wazuh☆84Updated last month
- Corelight@Home script☆42Updated last year
- All-in-one bundle of MISP, TheHive and Cortex☆169Updated 2 years ago
- Repo for Automations and other solutions for Elastic SIEM/Security.☆18Updated 4 years ago
- 🚀 IRIS-SOAR: Modular SOAR (Security Orchestration, Automation, and Response) implementation in Python. Designed to complement DFIR-IRIS …☆10Updated last year
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Updated 5 years ago
- ☆37Updated last year
- Kibana 7 Templates for Suricata IDPS Threat Hunting☆41Updated 2 years ago
- SOC Workflow App helps Security Analysts and Threat Hunters explore suspicious events, look into raw events arriving at the Elastic Stack…☆94Updated 2 years ago
- Official Palo Alto Networks MineMeld docker☆17Updated 5 years ago
- Convert Sigma rules to Wazuh rules☆67Updated last year
- ☆17Updated 3 years ago
- ansible role to setup MISP, Malware Information Sharing Platform & Threat Sharing☆54Updated 3 weeks ago
- A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the…☆62Updated 2 years ago
- Kibana 6 Templates for Suricata IDPS Threat Hunting☆24Updated 6 years ago
- Collection of walkthroughs on various threat hunting techniques☆75Updated 5 years ago
- Wazuh integration TheHive☆38Updated 2 years ago