otoriocyber / chronos
python framework to parse logs for IR
☆16Updated 4 years ago
Alternatives and similar repositories for chronos
Users that are interested in chronos are comparing it to the libraries listed below
Sorting:
- Mapping Corelight or Zeek data to Elastic Common Schema fields☆34Updated 3 weeks ago
- Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https…☆126Updated last year
- Elastic TIP is a python tool which automates the process of aggregating Threat Intelligence and ingesting the intelligence into a common …☆27Updated 9 months ago
- A community event for security researchers to share their favorite notebooks☆107Updated last year
- Cyber Defence Monitoring Course Suite :: Suricata, Arkime (and others in the past)☆104Updated 11 months ago
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Updated 5 years ago
- OSSEM Common Data Model☆55Updated 2 years ago
- The Infosec Community Definitive Guide to Jupyter Notebooks☆121Updated 4 years ago
- An ELK environment containing interesting security datasets.☆137Updated 5 years ago
- A collection of notebooks built for defensive and offensive operations.☆77Updated 4 years ago
- misp-cloud - Cloud-ready images of MISP☆72Updated 2 years ago
- Import specific data sources into the Sigma generic and open signature format.☆78Updated 3 years ago
- 1-Click push forensics evidence to the cloud☆142Updated 10 months ago
- The FASTEST way to consume threat intel.☆68Updated 2 years ago
- Firepit - STIX Columnar Storage☆16Updated 11 months ago
- Yara-Endpoint is a tool useful for incident response as well as anti-malware enpoint base on Yara signatures.☆109Updated 7 years ago
- Zeek support for Community ID flow hashing.☆35Updated last year
- Salt States for Configuring the SIFT Workstation☆103Updated this week
- Converting data from services like Censys and Shodan to a common data model☆49Updated 8 months ago
- Tools to assist in forensicating docker☆83Updated 2 months ago
- Kestrel Jupyter Notebook Kernel☆9Updated last year
- Osquery Resources☆60Updated 5 years ago
- A python script to acquire multiple aws ec2 instances in a forensically sound-ish way☆38Updated 3 years ago
- Device profile: Define acceptable amounts of traffic for your devices and see a report of outliers.☆16Updated 5 years ago
- defendA Data Lake. A firehose pipeline to athena providing enrichment and normalization for security events☆16Updated 2 years ago
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆56Updated 3 years ago
- Legal, procedural and policies document templates for operating MISP and information sharing communities☆38Updated 2 years ago
- ☆17Updated 3 years ago
- Best practices in threat intelligence☆46Updated 2 years ago
- Bro script package to create JSON formatted logs to stream into data analysis systems.☆28Updated last year