swimlane / elk-tls-docker
This repository contains code to create a ELK stack with certificates & security enabled using docker-compose
☆188Updated 8 months ago
Alternatives and similar repositories for elk-tls-docker:
Users that are interested in elk-tls-docker are comparing it to the libraries listed below
- SIEGMA - Transform Sigma rules into SIEM consumables☆146Updated last year
- Installation script for ELK stack to make life easy.☆69Updated 4 years ago
- Technical add-on for Splunk related to TheHive/Cortex from TheHive project☆52Updated 3 weeks ago
- Repository for SPEED SIEM Use Case Framework☆53Updated 4 years ago
- A curated list of awesome things related to TheHive & Cortex☆175Updated 3 years ago
- A python package for use in generating fake data for SOC and security automation.☆167Updated this week
- Detection Ideas & Rules repository.☆179Updated 3 years ago
- A (nearly) production ready Dockered MISP☆231Updated last year
- All-in-one bundle of MISP, TheHive and Cortex☆170Updated 2 years ago
- Synapse: a Meta Alert Feeder for TheHive, a Security Incident Response Platform☆71Updated last year
- Build a attack range in your local machine☆130Updated last year
- A Ruleset to enhance detection capabilities of Ossec using Sysmon☆88Updated 2 years ago
- Repo containing docker-compose files and setup scripts without having to clone the individual reternal components☆109Updated 3 years ago
- The Infosec Community Definitive Guide to Jupyter Notebooks☆121Updated 4 years ago
- Python library for threat intelligence☆83Updated last month
- SIGMA UI is a free open-source application based on the Elastic stack and Sigma Converter (sigmac)☆185Updated 3 years ago
- Run Velociraptor on Security Onion☆37Updated 2 years ago
- Small-scale threat emulation and detection range built on Elastic and Atomic Redteam.☆37Updated last year
- A collection of notebooks built for defensive and offensive operations.☆77Updated 4 years ago
- OSSEM Data Dictionaries☆59Updated last month
- A Sigma to Wazuh / OSSEC converter including a generated Windows Sysmon ruleset☆33Updated 4 years ago
- Attack Range to test detection against nativel serverless cloud services and environments☆35Updated 3 years ago
- Convert Sigma rules to Wazuh rules☆63Updated 10 months ago
- SOC Workflow App helps Security Analysts and Threat Hunters explore suspicious events, look into raw events arriving at the Elastic Stack…☆94Updated 2 years ago
- ☆77Updated 5 years ago
- PowerShell - Endpoint Analysis Solution Your Windows Intranet Needs☆46Updated 2 months ago
- Mapping your datasources and detections to the MITRE ATT&CK Navigator framework.☆57Updated 4 years ago
- Convert Sigma rules to LogRhythm searches☆20Updated 2 years ago
- Docker image for Velocidex Velociraptor☆118Updated 7 months ago
- List of PowerShell commands and commandlets that should be in your Powershel watchlist☆37Updated 3 years ago