swimlane / elk-tls-dockerLinks
This repository contains code to create a ELK stack with certificates & security enabled using docker-compose
☆191Updated last year
Alternatives and similar repositories for elk-tls-docker
Users that are interested in elk-tls-docker are comparing it to the libraries listed below
Sorting:
- A python package for use in generating fake data for SOC and security automation.☆169Updated 4 months ago
- Purple Teaming Attack & Hunt Lab - Terraform☆159Updated 3 years ago
- PowerShell - Endpoint Analysis Solution Your Windows Intranet Needs☆48Updated 7 months ago
- Useful access control entries (ACE) on system access control list (SACL) of securable objects to find potential adversarial activity☆93Updated 3 years ago
- Build a attack range in your local machine☆131Updated 2 years ago
- Provides detection capabilities and log conversion to evtx or syslog capabilities☆54Updated 3 years ago
- Actionable data for Security Operations☆19Updated 3 years ago
- List of PowerShell commands and commandlets that should be in your Powershel watchlist☆37Updated 3 years ago
- Use Terraform to Provision Your Own Cloud-Based Remote Browsing Workstation☆26Updated last year
- A collection of Powershell scripts that will help automate the build process for a Marvel domain.☆147Updated last year
- Security Onion + Automation + Response Lab including n8n and Velociraptor☆110Updated 2 years ago
- Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D. Azure and AWS terraform support.☆134Updated 2 years ago
- ☆34Updated 4 years ago
- All-in-one bundle of MISP, TheHive and Cortex☆169Updated 2 years ago
- SOC Workflow App helps Security Analysts and Threat Hunters explore suspicious events, look into raw events arriving at the Elastic Stack…☆94Updated 2 years ago
- Small-scale threat emulation and detection range built on Elastic and Atomic Redteam.☆38Updated last year
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆68Updated 2 months ago
- Detection Ideas & Rules repository.☆179Updated 3 years ago
- Installation script for ELK stack to make life easy.☆69Updated 5 years ago
- Blue Team detection lab created with Terraform and Ansible in Azure.☆161Updated 7 months ago
- A tool to modify timestamps in a packet capture to a user selected date☆31Updated 3 years ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆70Updated 2 years ago
- Repo containing docker-compose files and setup scripts without having to clone the individual reternal components☆109Updated 4 years ago
- OSSEM Data Dictionaries☆61Updated 5 months ago
- Internal network honeypot for detecting if an attacker or insider threat scans your network for log4j CVE-2021-44228☆150Updated 3 years ago
- This script is made to collect the most valiable artifacts for foreniscs or incident reponse investigation rather than imaging the whole …☆202Updated 4 years ago
- Defence Against the Dark Arts☆34Updated 5 years ago
- Threat Hunting with ELK Workshop (InfoSecWorld 2017)☆66Updated 7 years ago
- Active Directory Purple Team Playbook☆110Updated 2 years ago
- Repository for SPEED SIEM Use Case Framework☆55Updated 5 years ago