threathunternotebook / SecurityOnion-Ansible-Playbooks
Ansible Playbooks for Security Onion Deployment to VMware ESXi
☆11Updated 2 years ago
Related projects: ⓘ
- Sample programs to access the API☆57Updated 2 months ago
- CrowdStrike's Open Source Policy & Contribution Guide☆35Updated last year
- CISA's space for collaboration on the Cybersecurity Performance Goals.☆70Updated 3 months ago
- ☆12Updated this week
- A Command-line tool which leverages the Tenable.io API to reduce the time it takes to get information that is common during remediation o…☆72Updated last week
- Explore the GOAD Active Directory lab in 5 minutes with Adalanche☆33Updated 8 months ago
- Jimi is an automation first no-code platform designed and developed originally for Security Orchestration and Response. Since its launch …☆159Updated 3 months ago
- Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https…☆121Updated 11 months ago
- The Infosec Community Definitive Guide to Jupyter Notebooks☆108Updated 3 years ago
- Import CrowdStrike Threat Intelligence into your instance of MISP☆40Updated this week
- Collection of Jupyter Notebooks by @fr0gger_☆139Updated 2 weeks ago
- Controls Assessment Specification☆65Updated 3 months ago
- SANS has developed a set of information security policy templates. These are free to use and fully customizable to your company's IT secu…☆28Updated 2 years ago
- The MITRE Security Automation Framework (SAF) Command Line Interface (CLI) brings together applications, techniques, libraries, and tools…☆131Updated this week
- Web based S1 query navigator for one-click threat hunting☆18Updated 3 years ago
- Recon tool for cloud provider attribution. Supports AWS, Azure, Google, Cloudflare, and Digital Ocean.☆155Updated 3 weeks ago
- Zerofox Alert Feeder for TheHive, an Open Source and Free Security Incident Response Platform☆36Updated 4 years ago
- Roota is a public-domain language of threat detection and response that combines native queries from a SIEM, EDR, XDR, or Data Lake with …☆112Updated 2 months ago
- Wazuh Agent as Docker Image☆21Updated 4 months ago
- ☆62Updated this week
- ☆30Updated 2 years ago
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆35Updated last year
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆49Updated 2 years ago
- Convert a variety of log formats to CSV while enriching detected IPs with Geolocation, ASN, DNS, WhoIs, Shodan InternetDB and Threat Indi…☆91Updated 2 months ago
- Docker configurations for TheHive, Cortex and 3rd party tools☆110Updated last year
- OpenCTI–Wazuh connector looking for indicators in Wazuh and creating sightings☆13Updated last month
- ☆14Updated last year
- ☆26Updated last week
- A web application to streamline the development of STIGs from SRGs☆60Updated last month
- ☆234Updated 3 months ago
- Convert Sigma rules to Wazuh rules☆55Updated 5 months ago