swimlane / elk-tls-dockerLinks
This repository contains code to create a ELK stack with certificates & security enabled using docker-compose
☆191Updated last year
Alternatives and similar repositories for elk-tls-docker
Users that are interested in elk-tls-docker are comparing it to the libraries listed below
Sorting:
- Purple Teaming Attack & Hunt Lab - Terraform☆160Updated 3 years ago
- Installation script for ELK stack to make life easy.☆69Updated 5 years ago
- All-in-one bundle of MISP, TheHive and Cortex☆168Updated 2 years ago
- PowerShell - Endpoint Analysis Solution Your Windows Intranet Needs☆48Updated 9 months ago
- A python package for use in generating fake data for SOC and security automation.☆170Updated 5 months ago
- Security Onion + Automation + Response Lab including n8n and Velociraptor☆112Updated 2 years ago
- Ansible Playbook to install the ELK Stack☆43Updated 5 years ago
- Repo containing docker-compose files and setup scripts without having to clone the individual reternal components☆111Updated 4 years ago
- Defensive Origins Training Schedule☆38Updated last year
- Detection Ideas & Rules repository.☆179Updated 3 years ago
- Internal network honeypot for detecting if an attacker or insider threat scans your network for log4j CVE-2021-44228☆151Updated 3 years ago
- evtx-hunter helps to quickly spot interesting security-related activity in Windows Event Viewer (EVTX) files.☆155Updated 3 years ago
- A tool to modify timestamps in a packet capture to a user selected date☆31Updated 4 years ago
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆155Updated 3 years ago
- Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D. Azure and AWS terraform support.☆136Updated 2 years ago
- Attack Range to test detection against nativel serverless cloud services and environments☆35Updated 3 years ago
- Blue Team detection lab created with Terraform and Ansible in Azure.☆162Updated 9 months ago
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆68Updated 3 weeks ago
- A collection of Powershell scripts that will help automate the build process for a Marvel domain.☆148Updated last year
- Actionable data for Security Operations☆19Updated 4 years ago
- Repository for SPEED SIEM Use Case Framework☆55Updated 5 years ago
- Sysmon and wazuh integration with Sigma sysmon rules [updated]☆68Updated 4 years ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆73Updated 2 years ago
- Use Terraform to Provision Your Own Cloud-Based Remote Browsing Workstation☆26Updated last year
- Provides detection capabilities and log conversion to evtx or syslog capabilities☆54Updated 3 years ago
- ☆77Updated 6 years ago
- Useful access control entries (ACE) on system access control list (SACL) of securable objects to find potential adversarial activity☆94Updated 3 years ago
- Active Directory Purple Team Playbook☆111Updated 2 years ago
- SOC Workflow App helps Security Analysts and Threat Hunters explore suspicious events, look into raw events arriving at the Elastic Stack…☆94Updated 3 years ago
- PatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform☆149Updated 3 years ago