mrlesmithjr / ansible-suricataLinks
☆12Updated 5 years ago
Alternatives and similar repositories for ansible-suricata
Users that are interested in ansible-suricata are comparing it to the libraries listed below
Sorting:
- An Ansible playbook for deploying the Suricata intrusion detection system and fetching Snort rules with Oinkmaster.☆17Updated 4 years ago
- Kibana 6 Templates for Suricata IDPS Threat Hunting☆24Updated 6 years ago
- ☆12Updated 5 years ago
- ansible role to setup MISP, Malware Information Sharing Platform & Threat Sharing☆54Updated last week
- A low/zero interaction ssh authentication logging honeypot☆23Updated last month
- Tools for Wazuh by Juan C. Tello☆15Updated 3 years ago
- Carving tool based in Radare2 & Yara☆16Updated 7 years ago
- Kibana 7 Templates for Suricata IDPS Threat Hunting☆43Updated 3 weeks ago
- Demo for Elastic's Auditbeat and SIEM☆24Updated 4 years ago
- server for indexing and querying passive DNS observations☆49Updated this week
- Proof-of-concept for phishing intelligence in Elastic☆15Updated 6 years ago
- Build Automated Machine Images for MISP☆29Updated 2 years ago
- FSL Test bench - Ansible playbook repository to setup a save environment for security auditing and testing. It can be used for teaching s…☆30Updated 11 months ago
- Corelight-Ansible-Roles are a collection of Ansible Roles and playbooks that install, configure, run and manage a variety of Corelight, S…☆16Updated 4 years ago
- Deploy an "illegal" SOC to manage vulnerabilities on your city servers in minutes.☆20Updated 2 years ago
- D4 core software (server and sample sensor client)☆42Updated last year
- Full Packet Capture for the Masses☆14Updated 7 years ago
- Threat Intelligence with Elastic - Minemeld integration with Elasticsearch☆19Updated 4 years ago
- OwlH Master API☆24Updated 6 months ago
- Very basic CLI SIEM (Security Information and Event Management system).☆41Updated 7 years ago
- A Python implementation of the Community ID flow hashing standard☆23Updated last year
- Example Suricata rules implementing some of my detection tactics☆22Updated 2 years ago
- A Spicy protocol analyzer for WireGuard☆29Updated 5 years ago
- A shell script to download malware domains from various sources, and configuring unbound DNS config file to be used as a local recursive …☆19Updated 11 years ago
- A Yara Lua output script for Suricata☆20Updated 6 years ago
- A guide on using Zimbra with Elastic Stack using centralized logging☆26Updated 2 years ago
- Cerberus is a toolkit to receive, parse, process and automate abuse reports handling received by ISP or hosting providers.☆15Updated 6 years ago
- Development repository for the snort cookbook☆27Updated 2 weeks ago
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Updated 5 years ago
- Modular IMAP proxy (including PyCIRCLeanMail and MISP forward modules)☆31Updated 7 years ago