elasticsearch, logstash and kibana configuration for pi-hole visualiziation
☆207Jul 17, 2022Updated 3 years ago
Alternatives and similar repositories for elk-hole
Users that are interested in elk-hole are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Installation script for ELK stack to make life easy.☆69Apr 19, 2020Updated 6 years ago
- Experimental DNS logs pipeline based on Pi-hole dnsmasq logs, ELK stack, and Filebeat. Sample configs included.☆29Oct 26, 2023Updated 2 years ago
- Elasticsearch / Kibana for Unifi USG and CloudKey (gen2)☆19Jun 5, 2020Updated 5 years ago
- Beats for Raspberry Pi / ARM☆84Dec 29, 2021Updated 4 years ago
- Cypher for Defenders: Leveraging Bloodhound Data Beyond the UI☆26Feb 8, 2024Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Monitoring Pi-Hole statistics with Grafana☆279Mar 17, 2025Updated last year
- Assorted, MIT licensed, threat hunting rules from @bradleyjkemp☆14Mar 11, 2022Updated 4 years ago
- Content Pack for piHole with Graylog☆20Jun 23, 2023Updated 2 years ago
- String extraction and classification tool for binary files, designed to extract only the strings that can be considered relevant (i.e. no…☆11Aug 9, 2020Updated 5 years ago
- Example Configurations for Logstash☆18Aug 26, 2024Updated last year
- ☆29Feb 16, 2021Updated 5 years ago
- Cloud Templates and scripts to deploy mordor environments☆130Mar 3, 2021Updated 5 years ago
- Prevent program and malware to bypass DNS filter by using DoH☆109Jul 10, 2022Updated 3 years ago
- pfSense/OPNsense + Elastic Stack☆1,212Nov 28, 2025Updated 5 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Vulnerability Assessment Module - OpenVas with Elastic stack using VulnWhisperer☆20Jun 11, 2019Updated 6 years ago
- Download and Inject code into Google Chrome extensions☆13Nov 16, 2017Updated 8 years ago
- Bash script for monitoring status of device backup in Synology Active Backup for Business in PRTG☆12Feb 14, 2026Updated 2 months ago
- A quick way to perform a bulk whois query. Utilizes Team Cymru's service. Requires netcat.☆11Feb 11, 2012Updated 14 years ago
- Easy links and guides for DEF CON 28 and 29☆57Aug 5, 2021Updated 4 years ago
- Replays log files at a given speed☆19Nov 5, 2025Updated 6 months ago
- Trying to get Unifi Dream Machine Pro syslogs sent to Wazuh Manager node processed, i came up with these decoder and rule sets.☆16May 7, 2024Updated 2 years ago
- Primary data pipelines for intrusion detection, security analytics and threat hunting☆85Jan 9, 2022Updated 4 years ago
- Philly Security Shell meetup demo and related files☆32Apr 15, 2019Updated 7 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Gravatar integration for Nextcloud☆13Sep 8, 2018Updated 7 years ago
- This Risk Rating Calculator is based on OWASP's Risk Rating Methodology☆22May 19, 2024Updated last year
- ☆33Jun 27, 2022Updated 3 years ago
- Sysmon configuration file template with default high-quality event tracing☆20Jan 26, 2021Updated 5 years ago
- From Raw Logs to Real Insights - A tutorial for getting started with log analytics using Elastic Stack.☆29Nov 19, 2020Updated 5 years ago
- The simple, agnostic and lightweight logging dashboard☆26Oct 28, 2022Updated 3 years ago
- A standalone python script leveraging ntdll for UEFI variable enumeration. This uses elements from the "chipsec" toolkit for formatting w…☆10Jul 25, 2023Updated 2 years ago
- Proof-of-concept for phishing intelligence in Elastic☆15Apr 30, 2019Updated 7 years ago
- CSIRT Tooling: Best Practices in Developing, Maintaining and Distributing Open Source Tools☆16Feb 26, 2026Updated 2 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Firewall-System based on OpenWRT or Pi-Hole with UnBound, TOR, optional Privoxy, opt. ntopng and opt. Configuration of the AVM FRITZ!Box…☆40Jan 23, 2025Updated last year
- Awesome List of Enterprise Security Tools' Community Edition☆16Nov 10, 2023Updated 2 years ago
- Run Sigma detection rules on logs from the new MacOS EndpointSecurity Framework☆22Jan 22, 2021Updated 5 years ago
- Logging Made Easy☆708Nov 1, 2023Updated 2 years ago
- pfsense-filebeat☆11Jun 6, 2019Updated 6 years ago
- Core module for Forgiva Enterprise connecting Forgiva Server to Forgiva Webclient.☆13Mar 28, 2022Updated 4 years ago
- NMAP NSE that enumerates VNC authentication types☆17Dec 21, 2010Updated 15 years ago