thomaspatzke / elk-detection-labView external linksLinks
An ELK environment containing interesting security datasets.
☆137May 11, 2020Updated 5 years ago
Alternatives and similar repositories for elk-detection-lab
Users that are interested in elk-detection-lab are comparing it to the libraries listed below
Sorting:
- Import specific data sources into the Sigma generic and open signature format.☆79May 6, 2022Updated 3 years ago
- Elasticsearch/Kibana environment and log data for Sigma workshop☆27Dec 20, 2019Updated 6 years ago
- DetectionLabELK is a fork from DetectionLab with ELK stack instead of Splunk.☆573Dec 12, 2021Updated 4 years ago
- Automatic detection engineering technical state compliance☆55Jul 7, 2024Updated last year
- A Splunk App containing Sigma detection rules, which can be updated from a Git repository.☆111Feb 6, 2020Updated 6 years ago
- Automated Use Case Testing☆171May 1, 2018Updated 7 years ago
- ☆14May 30, 2018Updated 7 years ago
- Blueteam operational triage registry hunting/forensic tool.☆149Sep 2, 2025Updated 5 months ago
- Resolvn Threat Hunting Virtual Machine☆139Aug 16, 2019Updated 6 years ago
- Elemental - An ATT&CK Threat Library☆318Dec 8, 2022Updated 3 years ago
- Re-play Security Events☆1,723Mar 20, 2024Updated last year
- A library for fast parse & import of Windows Eventlogs into Elasticsearch.☆86Jun 23, 2025Updated 7 months ago
- SIGMA UI is a free open-source application based on the Elastic stack and Sigma Converter (sigmac)☆189May 5, 2021Updated 4 years ago
- A standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logs☆780Updated this week
- Windows Events Attack Samples☆2,507Jan 24, 2023Updated 3 years ago
- Remote Desktop Client Fingerprint script for Zeek. Based off of https://github.com/0x4D31/fatt☆40Jun 20, 2023Updated 2 years ago
- Converts Sigma detection rules to a Splunk alert configuration.☆115May 18, 2020Updated 5 years ago
- All-in-one bundle of MISP, TheHive and Cortex☆169Sep 27, 2022Updated 3 years ago
- Sigma Detection Rule Repository☆92Jun 18, 2020Updated 5 years ago
- See adversary, do adversary: Simple execution of commands for defensive tuning/research (now with more ELF on the shelf)☆107Feb 12, 2023Updated 3 years ago
- Utilities for MITRE™ ATT&CK☆1,050Jan 3, 2026Updated last month
- ☆19Oct 23, 2020Updated 5 years ago
- Misc Threat Hunting Resources☆377Jan 26, 2023Updated 3 years ago
- S2AN - Mapper of Sigma/Suricata Rules/Signatures ➡️ MITRE ATT&CK Navigator☆91Dec 8, 2022Updated 3 years ago
- Open source training materials for law-enforcement and organisations interested in DFIR.☆63May 30, 2025Updated 8 months ago
- Sources, configuration and how to detect evil things utilizing Microsoft Sysmon.☆937Dec 12, 2023Updated 2 years ago
- EventList☆376Mar 21, 2021Updated 4 years ago
- ☆15Dec 16, 2020Updated 5 years ago
- Zeek plugin to generate data on per-packet sizes and intervals☆14Apr 21, 2020Updated 5 years ago
- Generic Signature Format for SIEM Systems☆18Jul 25, 2023Updated 2 years ago
- Searches For Threat Hunting and Security Analytics☆238Mar 26, 2025Updated 10 months ago
- Tools to rapidly deploy a threat hunting capability on Azure Sentinel that leverages Sysmon and MITRE ATT&CK☆1,077Nov 28, 2024Updated last year
- Open Source Security Events Metadata (OSSEM)☆1,286Feb 27, 2023Updated 2 years ago
- Place for resources used during the Mordor Detection hackathon event featuring APT29 ATT&CK evals datasets☆145Oct 12, 2020Updated 5 years ago
- Stand-alone parser for User Access Logging from Server 2012 and newer systems☆78Jan 9, 2024Updated 2 years ago
- Logging Made Easy☆710Nov 1, 2023Updated 2 years ago
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆207Jul 21, 2022Updated 3 years ago
- Detect Tactics, Techniques & Combat Threats☆2,263Jan 21, 2026Updated 3 weeks ago
- ATT&CK Remote Threat Hunting Incident Response☆206Dec 8, 2024Updated last year