swimlane / elk-tls-dockerLinks
This repository contains code to create a ELK stack with certificates & security enabled using docker-compose
☆192Updated last year
Alternatives and similar repositories for elk-tls-docker
Users that are interested in elk-tls-docker are comparing it to the libraries listed below
Sorting:
- A python package for use in generating fake data for SOC and security automation.☆170Updated 7 months ago
- All-in-one bundle of MISP, TheHive and Cortex☆169Updated 3 years ago
- Security Onion + Automation + Response Lab including n8n and Velociraptor☆112Updated 3 years ago
- Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D. Azure and AWS terraform support.☆139Updated 2 years ago
- Installation script for ELK stack to make life easy.☆69Updated 5 years ago
- Internal network honeypot for detecting if an attacker or insider threat scans your network for log4j CVE-2021-44228☆151Updated 3 years ago
- Ansible Playbook to install the ELK Stack☆44Updated 5 years ago
- The PoLRBear Project☆35Updated 4 years ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆74Updated 3 weeks ago
- SOC Workflow App helps Security Analysts and Threat Hunters explore suspicious events, look into raw events arriving at the Elastic Stack…☆94Updated 3 years ago
- Repo containing docker-compose files and setup scripts without having to clone the individual reternal components☆112Updated 4 years ago
- Repository for SPEED SIEM Use Case Framework☆56Updated 5 years ago
- A Docker container for remote penetration testing.☆141Updated 4 years ago
- ☆34Updated 4 years ago
- List of PowerShell commands and commandlets that should be in your Powershel watchlist☆37Updated 4 years ago
- ☆77Updated 6 years ago
- Mapping your datasources and detections to the MITRE ATT&CK Navigator framework.☆58Updated 5 years ago
- Useful access control entries (ACE) on system access control list (SACL) of securable objects to find potential adversarial activity☆94Updated 3 years ago
- Provides detection capabilities and log conversion to evtx or syslog capabilities☆54Updated 3 years ago
- Purple Teaming Attack & Hunt Lab - Terraform☆160Updated 3 years ago
- PowerShell - Endpoint Analysis Solution Your Windows Intranet Needs☆48Updated 10 months ago
- Actionable data for Security Operations☆19Updated 4 years ago
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆68Updated last week
- Corelight@Home script☆44Updated 2 years ago
- Automatic detection engineering technical state compliance☆55Updated last year
- Threat Hunting with ELK Workshop (InfoSecWorld 2017)☆65Updated 7 years ago
- Community Tasks/Plans for PlumHound Queueing☆23Updated 2 years ago
- A tool to modify timestamps in a packet capture to a user selected date☆31Updated 4 years ago
- evtx-hunter helps to quickly spot interesting security-related activity in Windows Event Viewer (EVTX) files.☆154Updated 3 years ago
- Detection Ideas & Rules repository.☆179Updated 4 years ago