michaelpeacock / kafka-sigma-streamsLinks
☆19Updated 3 years ago
Alternatives and similar repositories for kafka-sigma-streams
Users that are interested in kafka-sigma-streams are comparing it to the libraries listed below
Sorting:
- Analyze Zeek IDS data with ksqlDB running on Confluent Platform via Docker on your laptop. Or spin up an arbitrary number of AWS hosts, …☆11Updated 4 years ago
- ☆43Updated 2 years ago
- This repository was created to aid in the deployment/maintenance of the Sysmon service on a large number of computers.☆83Updated 2 years ago
- Elastic Beat for fetching and shipping Office 365 audit events☆68Updated 5 years ago
- A collection of Cortex Analyzers and Responders for TheHive/Cortex☆13Updated 5 years ago
- Kerberos Haters Guide to Zeek Threat Hunting☆34Updated 4 years ago
- Ansible role for installing Sysmon with popular config files included.☆24Updated 2 years ago
- Publicly shareable windows event log message data☆27Updated 6 years ago
- SOC Workflow App helps Security Analysts and Threat Hunters explore suspicious events, look into raw events arriving at the Elastic Stack…☆94Updated 3 years ago
- Knowing which rule should trigger according to the redcannary test☆11Updated last year
- Deploy and maintain Symon through the Splunk Deployment Sever☆31Updated 5 years ago
- Pushes Sysmon Configs☆88Updated 4 years ago
- Powershell Event Tracing Toolbox☆78Updated 3 years ago
- The idea is simply to save some quick notes that will make it easier for Splunk users to leverage KQL (Kusto), especially giving projects…☆44Updated 5 years ago
- PowerShell - Endpoint Analysis Solution Your Windows Intranet Needs☆48Updated last year
- Convert Sigma rules to LogRhythm searches☆22Updated 3 years ago
- Provides an advanced input.conf file for Windows and 3rd party related software with more than 70 different event log mapped to the MITRE…☆93Updated 6 months ago
- REST server that can analyze Kusto KQL queries against the Sentinel and Microsoft 365 Defender schemas.☆44Updated 3 months ago
- Read only mirror. To contribute or submit issues, please go to the website link --->☆15Updated 2 years ago
- Specific guidance and configuration scripts based on Microsoft-recommended security configuration baselines for Windows.☆14Updated 5 years ago
- Automated detection rule analysis utility☆29Updated 3 years ago
- A collection of useful PowerShell tools to collect, organize, and visualize Sysmon event data☆39Updated 5 years ago
- AppLocker hardening policies☆26Updated 7 years ago
- This package allows the use of a custom Elastalert Alert which creates alerts with observables in TheHive using TheHive4Py.☆27Updated 4 years ago
- Parses the FireEye HX .mans triage collections and sends them to ElasticSearch☆16Updated 2 years ago
- An Inofficial Sysmon Version History (Change Log)☆33Updated 5 years ago
- Synthetic Adversarial Log Objects: A Framework for synthentic log generation☆85Updated last year
- ☆88Updated 9 months ago
- Create alerts in The Hive from your Graylog alerts, to be turned into Hive cases.☆45Updated 5 years ago
- Powering Up Incident Response with Power-Response☆63Updated 5 years ago