Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threat hunting, blue team assessments, audits, and security control assessments.
☆18Apr 10, 2020Updated 5 years ago
Alternatives and similar repositories for sriracha-iq
Users that are interested in sriracha-iq are comparing it to the libraries listed below
Sorting:
- OpenDXL Console is a high-level web-based console for interacting with a DXL fabric☆11Mar 29, 2021Updated 4 years ago
- Build Automated Machine Images for MISP☆29Jun 9, 2023Updated 2 years ago
- Decentralized Cyber Threat Intelligence Kaizen Framework☆27Jan 31, 2022Updated 4 years ago
- Transform EQL detection rules to VQL artifacts☆12Nov 12, 2021Updated 4 years ago
- Kestrel Jupyter Notebook Kernel☆10Oct 19, 2023Updated 2 years ago
- Query.AI plugin for Kibana☆13Nov 10, 2019Updated 6 years ago
- ☆13Apr 8, 2022Updated 3 years ago
- Flame - Send vulnerabilities reports to SIEM☆15Jul 28, 2016Updated 9 years ago
- Helping Incident Responders hunt for potential persistence mechanisms on UNIX-based systems.☆17Oct 28, 2023Updated 2 years ago
- OpenDXL Broker is an open source version of a Data Exchange Layer (DXL) broker☆14Feb 11, 2024Updated 2 years ago
- Push "BAD" IPs/Networks into QRadar's "Remote Networks", tag them properly, and use them!☆18Nov 5, 2013Updated 12 years ago
- Listing releases of the Elastic stack with new features and references☆19Feb 4, 2026Updated last month
- Script to create MITRE ATT&CK Navigator layers from the annotated detection rules in Elastic Security (Kibana).☆20Jul 1, 2023Updated 2 years ago
- Collection of Jupyter Notebook for Threat Hunting and Blue Team Purposes☆22Jun 15, 2022Updated 3 years ago
- MITRE package gives you an approach to cybersecurity data sets.☆19Dec 20, 2022Updated 3 years ago
- A collection of open source Graylog integrations that will be released together.☆16Apr 3, 2024Updated last year
- Extract credentials from lsass remotely☆16Jan 3, 2020Updated 6 years ago
- A script to create and assign SOP tasks into the cases☆20Aug 16, 2020Updated 5 years ago
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆57Mar 2, 2026Updated last week
- ☆19Oct 30, 2020Updated 5 years ago
- BurpSuite Standard/Private Collaborator Library☆25Oct 11, 2021Updated 4 years ago
- Sharing Threat Hunting runbooks☆25Jul 5, 2019Updated 6 years ago
- Created on 10th August 2017. Purpose of this Project is to note down every useful object I gained during the time I spent working on OSCP…☆19Feb 26, 2018Updated 8 years ago
- OSSEM Common Data Model☆56Sep 20, 2022Updated 3 years ago
- The JSON REST API for the National Vulnerability Database☆24Dec 26, 2022Updated 3 years ago
- Ungraded practice exercises for python scripting for security course.☆12Jun 22, 2025Updated 8 months ago
- Open Security Summit 2019☆26Nov 16, 2020Updated 5 years ago
- ☆11Feb 10, 2026Updated 3 weeks ago
- Collection of various open-source an commercial rulesets for NIDS (especially for Suricata and Snort)☆29Jul 24, 2023Updated 2 years ago
- The Enhanced MITRE ATT&CK® Coverage Tracker is an Excel tool for SOCs to measure and improve detection coverage of cyber threats. It simp…☆34Nov 13, 2025Updated 3 months ago
- Experimental DNS logs pipeline based on Pi-hole dnsmasq logs, ELK stack, and Filebeat. Sample configs included.☆29Oct 26, 2023Updated 2 years ago
- Understand OVAL results in a blink of an eye☆35Jul 6, 2022Updated 3 years ago
- misp-cloud - Cloud-ready images of MISP☆74Aug 24, 2022Updated 3 years ago
- The "Let's-defend-solution" directory contains the answers to all paths of the Let's Defend platform that were saved by the creator 8 mon…☆12Apr 27, 2023Updated 2 years ago
- Fully functional & encrypted chat-application.☆11Mar 28, 2024Updated last year
- Create dataset for suricata with indicators of MISP instances and add sightings in MISP if an indicator of dataset generates an alert☆37Nov 9, 2022Updated 3 years ago
- This repository hosts community contributed Kestrel huntflows (.hf) and huntbooks (.ipynb)☆37Jan 2, 2024Updated 2 years ago
- Cheat sheets for threat hunting, detection and other stuff.☆34Oct 7, 2022Updated 3 years ago
- ☆33Oct 16, 2025Updated 4 months ago