otoriocyber / chronosLinks
python framework to parse logs for IR
☆16Updated 4 years ago
Alternatives and similar repositories for chronos
Users that are interested in chronos are comparing it to the libraries listed below
Sorting:
- Mapping Corelight or Zeek data to Elastic Common Schema fields☆34Updated last month
- A platform built for easy-to-use automated network traffic analysis☆59Updated 2 years ago
- Elastic TIP is a python tool which automates the process of aggregating Threat Intelligence and ingesting the intelligence into a common …☆27Updated 11 months ago
- Manage, monitor and improve your cyber security posture.☆90Updated 2 years ago
- Osquery Resources☆61Updated 5 years ago
- Generate network maps from packet captures☆30Updated 5 years ago
- Cisco Orbital - Osquery queries by Talos☆134Updated 10 months ago
- Convert XCCDF files from DISA STIG and OpenSCAP Content into Comma Separated Values files making it easier to convert into potential Open…☆16Updated 8 years ago
- defendA Data Lake. A firehose pipeline to athena providing enrichment and normalization for security events☆16Updated 2 years ago
- OSSEM Common Data Model☆56Updated 2 years ago
- ☆18Updated 3 years ago
- Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https…☆126Updated last year
- a port made of honey for blocking people☆13Updated 5 years ago
- Kestrel Jupyter Notebook Kernel☆9Updated last year
- Documentation used for Shuffle☆19Updated this week
- The Infosec Community Definitive Guide to Jupyter Notebooks☆122Updated 4 years ago
- Salt States for Configuring the SIFT Workstation☆104Updated this week
- The NAVV (Network Architecture Verification and Validation) tool creates a spreadsheet for network traffic analysis from PCAP data and Ze…☆32Updated last year
- CrowdStrike's Open Source Policy & Contribution Guide☆42Updated 3 months ago
- Posture Attribute Collection and Evaluation☆23Updated 2 years ago
- A collection of notebooks built for defensive and offensive operations.☆77Updated 4 years ago
- OASIS TC Open Repository: CSAF Parser tool for parsing and checking the syntax of the Common Vulnerability Reporting Framework (CVRF) con…☆23Updated 3 years ago
- A python package for use in generating fake data for SOC and security automation.☆169Updated 4 months ago
- Cloud security tutorials and best practices☆38Updated 2 years ago
- Best practices in threat intelligence☆47Updated 2 years ago
- Firepit - STIX Columnar Storage☆16Updated last year
- An open-source, real-time Security Information & Event Management tool based on big data technologies, providing a scalable, advanced sec…☆207Updated 3 months ago
- Joint NIST/FedRAMP tool to interact with OSCAL files via a browser-based GUI☆44Updated 5 years ago
- Template for building a packet sniffer☆14Updated last year
- Structured Threat Intelligence Graph☆95Updated 3 months ago