opensearch-project / security-analyticsLinks
Security Analytics enables users for detecting security threats on their security event log data. It will also allow them to modify/tailor the pre-packaged solution.
☆94Updated this week
Alternatives and similar repositories for security-analytics
Users that are interested in security-analytics are comparing it to the libraries listed below
Sorting:
- Open source endpoint agent providing host information to Zeek. [v2]☆90Updated 2 weeks ago
- Helm charts for running open source digital forensic tools in Kubernetes☆181Updated this week
- ☆29Updated 2 weeks ago
- This repo contains example of raw event examples and possible translations to the OCSF schema.☆52Updated 6 months ago
- A standard for reducing log volume without sacrificing analytical capability☆214Updated 11 months ago
- Jimi is an automation first no-code platform designed and developed originally for Security Orchestration and Response. Since its launch …☆169Updated last year
- Apps to be used for Shuffle automation. Most of Shuffle's apps (2500+) are generated from APIs, and available in the search engine below:☆122Updated 3 weeks ago
- The Sigma command line interface based on pySigma☆176Updated last month
- Cisco Orbital - Osquery queries by Talos☆136Updated last year
- ☆51Updated last month
- OCSF Documentation☆152Updated last week
- ☆60Updated this week
- OCSF (https://schema.ocsf.io/) models in Python using Pydantic.☆33Updated last week
- Kestrel threat hunting language: building reusable, composable, and shareable huntflows across different data sources and threat intel.☆324Updated last year
- Sample programs to access the API☆103Updated 2 months ago
- Mapping Corelight or Zeek data to Elastic Common Schema fields☆34Updated 3 months ago
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆60Updated 3 years ago
- SOARCA - The Open Source CACAO-based Security Orchestrator!☆100Updated last week
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆88Updated last week
- SIEGMA - Transform Sigma rules into SIEM consumables☆159Updated 10 months ago
- The Wazuh agent for endpoints.☆94Updated 7 months ago
- Public static website for the D3FEND project. For the D3FEND ontology repo see: https://github.com/d3fend/d3fend-ontology☆90Updated last month
- The principal objective of this project is to develop a knowledge base of the tactics, techniques, and procedures (TTPs) used by insiders…☆147Updated 6 months ago
- ☆53Updated this week
- Roota is a public-domain language of threat detection and response that combines native queries from a SIEM, EDR, XDR, or Data Lake with …☆132Updated last year
- This repository hosts community contributed Kestrel huntflows (.hf) and huntbooks (.ipynb)☆36Updated 2 years ago
- OCA-wide documentation shared by all sub-projects and repositories☆33Updated last year
- OSSEM Common Data Model☆56Updated 3 years ago
- An IDE and translation engine for detection engineers and threat hunters. Be faster, write smarter, keep 100% privacy.☆172Updated 2 months ago
- The MITRE Security Automation Framework (SAF) Command Line Interface (CLI) brings together applications, techniques, libraries, and tools…☆171Updated this week