swimlane / elk-tls-dockerLinks
This repository contains code to create a ELK stack with certificates & security enabled using docker-compose
☆191Updated last year
Alternatives and similar repositories for elk-tls-docker
Users that are interested in elk-tls-docker are comparing it to the libraries listed below
Sorting:
- PowerShell - Endpoint Analysis Solution Your Windows Intranet Needs☆48Updated 8 months ago
- Purple Teaming Attack & Hunt Lab - Terraform☆160Updated 3 years ago
- Installation script for ELK stack to make life easy.☆69Updated 5 years ago
- Ansible Playbook to install the ELK Stack☆43Updated 5 years ago
- Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D. Azure and AWS terraform support.☆134Updated 2 years ago
- Security Onion + Automation + Response Lab including n8n and Velociraptor☆111Updated 2 years ago
- A python package for use in generating fake data for SOC and security automation.☆170Updated 5 months ago
- All-in-one bundle of MISP, TheHive and Cortex☆169Updated 2 years ago
- Convert Sigma rules to Wazuh rules☆67Updated last year
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆71Updated 2 years ago
- Detection Ideas & Rules repository.☆179Updated 3 years ago
- Threat Hunting with ELK Workshop (InfoSecWorld 2017)☆66Updated 7 years ago
- OSSEM Data Dictionaries☆62Updated 6 months ago
- Blue Team detection lab created with Terraform and Ansible in Azure.☆162Updated 8 months ago
- Repo containing docker-compose files and setup scripts without having to clone the individual reternal components☆110Updated 4 years ago
- A collection of Powershell scripts that will help automate the build process for a Marvel domain.☆147Updated last year
- Build a attack range in your local machine☆131Updated 2 years ago
- Provides detection capabilities and log conversion to evtx or syslog capabilities☆54Updated 3 years ago
- Sysmon and wazuh integration with Sigma sysmon rules [updated]☆68Updated 4 years ago
- evtx-hunter helps to quickly spot interesting security-related activity in Windows Event Viewer (EVTX) files.☆155Updated 3 years ago
- Internal network honeypot for detecting if an attacker or insider threat scans your network for log4j CVE-2021-44228☆150Updated 3 years ago
- Repository for SPEED SIEM Use Case Framework☆55Updated 5 years ago
- Active Directory Purple Team Playbook☆110Updated 2 years ago
- Actionable data for Security Operations☆19Updated 3 years ago
- Python library for threat intelligence☆87Updated 6 months ago
- Useful access control entries (ACE) on system access control list (SACL) of securable objects to find potential adversarial activity☆94Updated 3 years ago
- S2AN - Mapper of Sigma/Suricata Rules/Signatures ➡️ MITRE ATT&CK Navigator☆87Updated 2 years ago
- ☆77Updated 6 years ago
- HXTool is an extended user interface for the FireEye HX Endpoint product. HXTool can be installed on a dedicated server or on your physic…☆84Updated last year
- Create alerts in The Hive from your Graylog alerts, to be turned into Hive cases.☆44Updated 4 years ago