rocknsm / rockLinks
Automated deployment scripts for the RockNSM network hunting distribution.
☆455Updated 2 years ago
Alternatives and similar repositories for rock
Users that are interested in rock are comparing it to the libraries listed below
Sorting:
- Main MineMeld documentation repo☆380Updated 7 years ago
- DPS' Lightweight Investigation Notebook☆432Updated last year
- File Scanning Framework☆293Updated 3 years ago
- The main project for the Unfetter-Discover application. This is the project that will hold the configuration files, the docker-compose f…☆414Updated 2 years ago
- DEPRECATED - USE v3 (bearded-avenger)☆228Updated 7 years ago
- Documentation of TheHive☆398Updated last year
- Contains Logstash related content including tons of Logstash configurations☆254Updated 3 years ago
- Sandia Cyber Omni Tracker (SCOT)☆248Updated 8 months ago
- Graylog Processing Pipeline functions to enrich log messages with IoC information from threat intelligence databases☆154Updated last year
- An analytical framework for network traffic and behavioral analytics☆452Updated 2 years ago
- Honeypot Intelligence with Splunk☆254Updated 6 years ago
- Collect, Process, and Hunt with host based data from MacOS, Windows, and Linux☆499Updated 2 years ago
- Evolving directions on building the best Open Source Forensics VM☆160Updated 7 years ago
- Suricata Extreme Performance Tuning guide☆210Updated 7 years ago
- Engine of MineMeld☆140Updated 2 years ago
- Threat Feed Aggregation, Made Easy☆168Updated 4 years ago
- Documentation of Cortex☆174Updated last year
- A repository for using osquery for incident detection and response☆854Updated 2 years ago
- An open source framework for enterprise level automated analysis.☆395Updated 3 years ago
- CIF v3 -- the fastest way to consume threat intelligence☆182Updated 2 years ago
- Enterprise Log Search and Archive☆209Updated 6 years ago
- Laika BOSS: Object Scanning System☆747Updated 6 months ago
- Tool to gather Threat Intelligence indicators from publicly available sources☆660Updated 6 years ago
- FireEye Publicly Shared Indicators of Compromise (IOCs)☆468Updated 6 years ago
- Documentation for the GRR Rapid Reponse framework☆303Updated 9 months ago
- Incident Response Forensic Framework☆602Updated 5 years ago
- ELK configuration files for Forensic Analysts and Incident Handlers (unmaintained)☆179Updated 6 years ago
- Web Based Event Viewer (GUI) for Suricata EVE Events in Elastic Search☆461Updated last month
- Modular file scanning/analysis framework☆619Updated 5 years ago
- Python-based utility that uses supervised machine learning to detect phishing domains from the Certificate Transparency log network.☆324Updated 10 months ago