rocknsm / rock
Automated deployment scripts for the RockNSM network hunting distribution.
☆449Updated last year
Alternatives and similar repositories for rock:
Users that are interested in rock are comparing it to the libraries listed below
- Main MineMeld documentation repo☆378Updated 7 years ago
- File Scanning Framework☆290Updated 3 years ago
- An analytical framework for network traffic and behavioral analytics☆450Updated 2 years ago
- Documentation of TheHive☆396Updated last year
- DEPRECATED - USE v3 (bearded-avenger)☆227Updated 7 years ago
- Documentation of Cortex☆172Updated last year
- The main project for the Unfetter-Discover application. This is the project that will hold the configuration files, the docker-compose f…☆411Updated 2 years ago
- Graylog Processing Pipeline functions to enrich log messages with IoC information from threat intelligence databases☆153Updated 11 months ago
- Main Build directory☆178Updated 5 years ago
- DPS' Lightweight Investigation Notebook☆427Updated last year
- Evolving directions on building the best Open Source Forensics VM☆159Updated 6 years ago
- A Linux Auditd rule set mapped to MITRE's Attack Framework☆780Updated 4 years ago
- Automated Docker MISP container - Malware Information Sharing Platform and Threat Sharing☆175Updated 3 years ago
- Threat Feed Aggregation, Made Easy☆167Updated 4 years ago
- Scirius is a web application for Suricata ruleset management and threat hunting.☆642Updated 2 months ago
- Contains Logstash related content including tons of Logstash configurations☆253Updated 3 years ago
- Collect, Process, and Hunt with host based data from MacOS, Windows, and Linux☆498Updated 2 years ago
- FireEye Publicly Shared Indicators of Compromise (IOCs)☆463Updated 6 years ago
- Sandia Cyber Omni Tracker (SCOT)☆246Updated 3 months ago
- ☆212Updated last year
- Engine of MineMeld☆141Updated 2 years ago
- Suricata Extreme Performance Tuning guide☆207Updated 6 years ago
- A repository for using osquery for incident detection and response☆837Updated 2 years ago
- Configuration files for the SOF-ELK VM☆1,550Updated this week
- An open source framework for enterprise level automated analysis.☆395Updated 2 years ago
- CIF v3 -- the fastest way to consume threat intelligence☆183Updated last year
- Salt States for Configuring the SIFT Workstation☆98Updated this week
- Create actionable data from your Vulnerability Scans☆1,365Updated 2 years ago
- ELK configuration files for Forensic Analysts and Incident Handlers (unmaintained)☆179Updated 5 years ago
- Honeypot Intelligence with Splunk☆254Updated 6 years ago