utmstack / UTMStackLinks
Enterprise-ready SIEM, SOAR and Compliance powered by real-time correlation and threat intelligence.
☆277Updated this week
Alternatives and similar repositories for UTMStack
Users that are interested in UTMStack are comparing it to the libraries listed below
Sorting:
- Fully automated host & network intrusion detection platform. Detects malware from behavioural patterns rather than signatures and enables…☆136Updated last year
- ⚡️ Catalyst is a self-hosted, open source incident response platform and ticket system that helps to automate alert handling and incident…☆401Updated this week
- A free and open platform for detecting and preventing email attacks like BEC, malware, and credential phishing. Gain visibility and contr…☆213Updated last week
- SOCFortress CoPilot☆280Updated this week
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆298Updated last week
- Linux Security and Monitoring Scripts☆323Updated 7 months ago
- ☆261Updated 6 months ago
- Automation tool for Windows Deception Host Burn-In☆86Updated 6 months ago
- Logging Made Easy (LME) is a no cost, open source platform that centralizes log collection, enhances threat detection, and enables real-…☆1,046Updated this week
- NethSecurity image and build environment☆144Updated this week
- Vulnerability-Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streaml…☆300Updated this week
- Advanced Wazuh Rules for more accurate threat detection. Feel free to implement within your own Wazuh environment, contribute, or fork!☆752Updated this week
- Bitor Scanning Software☆380Updated 2 weeks ago
- BLint is a Binary Linter to check the security properties, and capabilities in your executables. Since v2, blint is also an SBOM generato…☆370Updated last month
- Deep Linux runtime visibility meets Wireshark☆291Updated 3 weeks ago
- ☆73Updated 2 months ago
- Add a layer of active defense to your cloud applications.☆92Updated last week
- Manage, monitor and improve your cyber security posture.☆90Updated 2 years ago
- Streamline vulnerability patching with CVSS, EPSS, and CISA's Known Exploited Vulnerabilities. Prioritize actions based on real-time thre…☆646Updated 2 months ago
- A standard for reducing log volume without sacrificing analytical capability☆205Updated 3 months ago
- Roota is a public-domain language of threat detection and response that combines native queries from a SIEM, EDR, XDR, or Data Lake with …☆128Updated 10 months ago
- SCuBA Secure Configuration Baselines and assessment tool for Google Workspace☆230Updated last week
- Useful scripts for those administering Wazuh☆84Updated last week
- Analyze pcaps with Zeek and a Grafana Dashboard☆177Updated last year
- (Unofficial) Wazuh integration to send alerts to IRIS.☆17Updated 5 months ago
- A simple application that extracts your IoCs from garbage input and checks their reputation using multiple CTI services.☆417Updated this week
- Transform Linux Audit logs for SIEM usage☆767Updated 3 weeks ago
- Open Source SIEM Stack☆92Updated 3 months ago
- 🤖 Admyral enables continuous control monitoring for any custom control☆329Updated 6 months ago
- ☆122Updated last week