tiburon-security / sriracha-iqView external linksLinks
Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threat hunting, blue team assessments, audits, and security control assessments.
☆18Apr 10, 2020Updated 5 years ago
Alternatives and similar repositories for sriracha-iq
Users that are interested in sriracha-iq are comparing it to the libraries listed below
Sorting:
- OpenDXL Console is a high-level web-based console for interacting with a DXL fabric☆11Mar 29, 2021Updated 4 years ago
- Decentralized Cyber Threat Intelligence Kaizen Framework☆27Jan 31, 2022Updated 4 years ago
- Build Automated Machine Images for MISP☆29Jun 9, 2023Updated 2 years ago
- Bug Bounty Monitor☆15Nov 23, 2020Updated 5 years ago
- Kestrel Jupyter Notebook Kernel☆10Oct 19, 2023Updated 2 years ago
- Transform EQL detection rules to VQL artifacts☆12Nov 12, 2021Updated 4 years ago
- Query.AI plugin for Kibana☆13Nov 10, 2019Updated 6 years ago
- ☆13Apr 8, 2022Updated 3 years ago
- Pathfinder is a plugin for mapping network vulnerabilities, scanned by CALDERA or imported by a supported network scanner, and translatin…☆128Apr 3, 2025Updated 10 months ago
- Flame - Send vulnerabilities reports to SIEM☆15Jul 28, 2016Updated 9 years ago
- Helping Incident Responders hunt for potential persistence mechanisms on UNIX-based systems.☆17Oct 28, 2023Updated 2 years ago
- OpenDXL Broker is an open source version of a Data Exchange Layer (DXL) broker☆14Feb 11, 2024Updated 2 years ago
- Listing releases of the Elastic stack with new features and references☆19Feb 4, 2026Updated last week
- Push "BAD" IPs/Networks into QRadar's "Remote Networks", tag them properly, and use them!☆18Nov 5, 2013Updated 12 years ago
- Script to create MITRE ATT&CK Navigator layers from the annotated detection rules in Elastic Security (Kibana).☆20Jul 1, 2023Updated 2 years ago
- Sightings Ecosystem gives cyber defenders visibility into what adversaries actually do in the wild. With your help, we are tracking MITRE…☆38May 28, 2025Updated 8 months ago
- Collection of Jupyter Notebook for Threat Hunting and Blue Team Purposes☆22Jun 15, 2022Updated 3 years ago
- Report missing advisories and corrections on OSS Index☆17Jan 19, 2023Updated 3 years ago
- MITRE package gives you an approach to cybersecurity data sets.☆19Dec 20, 2022Updated 3 years ago
- Extract credentials from lsass remotely☆16Jan 3, 2020Updated 6 years ago
- A collection of open source Graylog integrations that will be released together.☆16Apr 3, 2024Updated last year
- Experimental ONLY: This consolidated data of scenario-2 of the US-CERT dataset for insider threats to be used with TF 2.0 and Keras☆20Apr 28, 2022Updated 3 years ago
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆55Updated this week
- ☆19Oct 30, 2020Updated 5 years ago
- Sharing Threat Hunting runbooks☆25Jul 5, 2019Updated 6 years ago
- Created on 10th August 2017. Purpose of this Project is to note down every useful object I gained during the time I spent working on OSCP…☆19Feb 26, 2018Updated 7 years ago
- BurpSuite Standard/Private Collaborator Library☆25Oct 11, 2021Updated 4 years ago
- MISP-STIX-Converter - Python library to handle the conversion between MISP and STIX formats☆56Feb 4, 2026Updated last week
- YAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.☆27Dec 14, 2021Updated 4 years ago
- Open Security Summit 2019☆26Nov 16, 2020Updated 5 years ago
- The JSON REST API for the National Vulnerability Database☆24Dec 26, 2022Updated 3 years ago
- Collection of various open-source an commercial rulesets for NIDS (especially for Suricata and Snort)☆29Jul 24, 2023Updated 2 years ago
- The Enhanced MITRE ATT&CK® Coverage Tracker is an Excel tool for SOCs to measure and improve detection coverage of cyber threats. It simp…☆34Nov 13, 2025Updated 3 months ago
- ☆33Updated this week
- Connect your mail client/infrastructure to MISP in order to create events based on the information contained within mails.☆69Nov 11, 2023Updated 2 years ago
- Legal, procedural and policies document templates for operating MISP and information sharing communities☆38Jan 31, 2023Updated 3 years ago
- Understand OVAL results in a blink of an eye☆35Jul 6, 2022Updated 3 years ago
- Experimental DNS logs pipeline based on Pi-hole dnsmasq logs, ELK stack, and Filebeat. Sample configs included.☆29Oct 26, 2023Updated 2 years ago
- misp-cloud - Cloud-ready images of MISP☆74Aug 24, 2022Updated 3 years ago