lmakonem / ELK-SIEM-Ansible-Playbook
Ansible Playbook to install the ELK Stack
☆43Updated 4 years ago
Alternatives and similar repositories for ELK-SIEM-Ansible-Playbook:
Users that are interested in ELK-SIEM-Ansible-Playbook are comparing it to the libraries listed below
- ☆17Updated 2 years ago
- Installation script for ELK stack to make life easy.☆68Updated 5 years ago
- Run Velociraptor on Security Onion☆37Updated 2 years ago
- 🚀 IRIS-SOAR: Modular SOAR (Security Orchestration, Automation, and Response) implementation in Python. Designed to complement DFIR-IRIS …☆10Updated last year
- ☆48Updated this week
- Useful scripts for those administering Wazuh☆83Updated 3 months ago
- Sysmon and wazuh integration with Sigma sysmon rules [updated]☆65Updated 3 years ago
- A bash script to create a persistent port mirror for an IDS within a Proxmox hypervisor☆19Updated 6 years ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆70Updated last year
- Kibana 7 Templates for Suricata IDPS Threat Hunting☆40Updated 2 years ago
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Updated 5 years ago
- Security Onion + Automation + Response Lab including n8n and Velociraptor☆109Updated 2 years ago
- Repo Filled With Follow Along Guides☆75Updated 2 years ago
- Wazuh integration TheHive☆35Updated 2 years ago
- Kibana 6 Templates for Suricata IDPS Threat Hunting☆24Updated 6 years ago
- Wazuh - Splunk App☆53Updated 7 months ago
- ☆16Updated 3 years ago
- ☆88Updated last week
- ☆53Updated last week
- Repo of python/bash scripts for identifying IoC's in threat feed and other online tools☆27Updated 4 years ago
- Convert Sigma rules to Wazuh rules☆64Updated last year
- Threat Hunting with ELK Workshop (InfoSecWorld 2017)☆66Updated 7 years ago
- Elastic TIP is a python tool which automates the process of aggregating Threat Intelligence and ingesting the intelligence into a common …☆27Updated 9 months ago
- Docker configurations for TheHive, Cortex and 3rd party tools☆122Updated 2 years ago
- ☆31Updated 3 years ago
- ☆34Updated last year
- Collection of walkthroughs on various threat hunting techniques☆75Updated 4 years ago
- Security Assessment Data Management and Analysis Tool☆39Updated 4 years ago
- Run zeek with zeekctl in docker☆51Updated 7 months ago
- A Ruleset to enhance detection capabilities of Ossec using Sysmon☆92Updated 3 years ago