elasticsearch, logstash and kibana configuration for pi-hole visualiziation
☆207Jul 17, 2022Updated 3 years ago
Alternatives and similar repositories for elk-hole
Users that are interested in elk-hole are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Installation script for ELK stack to make life easy.☆69Apr 19, 2020Updated 5 years ago
- Elasticsearch / Kibana for Unifi USG and CloudKey (gen2)☆19Jun 5, 2020Updated 5 years ago
- Beats for Raspberry Pi / ARM☆84Dec 29, 2021Updated 4 years ago
- Cypher for Defenders: Leveraging Bloodhound Data Beyond the UI☆26Feb 8, 2024Updated 2 years ago
- The ELK stack powered by Docker and Compose.☆37Sep 15, 2016Updated 9 years ago
- Assorted, MIT licensed, threat hunting rules from @bradleyjkemp☆14Mar 11, 2022Updated 4 years ago
- Content Pack for piHole with Graylog☆20Jun 23, 2023Updated 2 years ago
- String extraction and classification tool for binary files, designed to extract only the strings that can be considered relevant (i.e. no…☆11Aug 9, 2020Updated 5 years ago
- ☆29Feb 16, 2021Updated 5 years ago
- Cloud Templates and scripts to deploy mordor environments☆129Mar 3, 2021Updated 5 years ago
- pfSense/OPNsense + Elastic Stack☆1,205Nov 28, 2025Updated 3 months ago
- Vulnerability Assessment Module - OpenVas with Elastic stack using VulnWhisperer☆20Jun 11, 2019Updated 6 years ago
- Docker image to build elastic/beats for Raspberry Pi☆42Aug 25, 2021Updated 4 years ago
- a client for communicating with Pi-hole API☆13Dec 8, 2022Updated 3 years ago
- Some tools to proccess tcpdump dumps☆16Nov 22, 2015Updated 10 years ago
- Import Mitre Att&ck into Neo4j database☆39Mar 5, 2026Updated 2 weeks ago
- Bash script for monitoring status of device backup in Synology Active Backup for Business in PRTG☆11Feb 14, 2026Updated last month
- Easy links and guides for DEF CON 28 and 29☆57Aug 5, 2021Updated 4 years ago
- Replays log files at a given speed☆19Nov 5, 2025Updated 4 months ago
- A simple low-interaction port monitoring honeypot.☆19Jun 14, 2020Updated 5 years ago
- Philly Security Shell meetup demo and related files☆32Apr 15, 2019Updated 6 years ago
- Monolog webhook handler for sending your logs to slack☆11Dec 8, 2020Updated 5 years ago
- Gravatar integration for Nextcloud☆13Sep 8, 2018Updated 7 years ago
- This Risk Rating Calculator is based on OWASP's Risk Rating Methodology☆22May 19, 2024Updated last year
- ☆33Jun 27, 2022Updated 3 years ago
- Sysmon configuration file template with default high-quality event tracing☆20Jan 26, 2021Updated 5 years ago
- Bash script to install Let's Encrypt SSL certificates automatically using acme.sh with EasyEngine☆21Mar 19, 2019Updated 7 years ago
- SilkETW & SilkService☆40Aug 14, 2019Updated 6 years ago
- The simple, agnostic and lightweight logging dashboard☆26Oct 28, 2022Updated 3 years ago
- Checks our resources to monitor Identity Changes☆17Nov 29, 2025Updated 3 months ago
- Proof-of-concept for phishing intelligence in Elastic☆15Apr 30, 2019Updated 6 years ago
- Firewall-System based on OpenWRT or Pi-Hole with UnBound, TOR, optional Privoxy, opt. ntopng and opt. Configuration of the AVM FRITZ!Box…☆39Jan 23, 2025Updated last year
- Command line tool that enables automated penetration testing in the Microsoft stack using OWASP ZAP☆20Feb 22, 2015Updated 11 years ago
- Run Sigma detection rules on logs from the new MacOS EndpointSecurity Framework☆22Jan 22, 2021Updated 5 years ago
- pfsense-filebeat☆11Jun 6, 2019Updated 6 years ago
- Install Nextcloud with another logical architecture on KVM with Terraform, Libvirt provider and Ansible☆14Nov 23, 2020Updated 5 years ago
- NMAP NSE that enumerates VNC authentication types☆17Dec 21, 2010Updated 15 years ago
- Core module for Forgiva Enterprise connecting Forgiva Server to Forgiva Webclient.☆13Mar 28, 2022Updated 3 years ago
- ☆10May 31, 2020Updated 5 years ago