utmstack / UTMStackLinks
Enterprise-ready SIEM, SOAR and Compliance powered by real-time correlation and threat intelligence.
☆283Updated this week
Alternatives and similar repositories for UTMStack
Users that are interested in UTMStack are comparing it to the libraries listed below
Sorting:
- Fully automated host & network intrusion detection platform. Detects malware from behavioural patterns rather than signatures and enables…☆137Updated last year
- SOCFortress CoPilot☆296Updated this week
- A simple-to-use IR (incident response) case management tool for tracking and documenting investigations.☆217Updated 2 weeks ago
- ⚡️ Catalyst is a self-hosted, open source incident response platform and ticket system that helps to automate alert handling and incident…☆408Updated 2 weeks ago
- A free and open platform for detecting and preventing email attacks like BEC, malware, and credential phishing. Gain visibility and contr…☆219Updated last month
- Bitor Scanning Software☆391Updated this week
- Open Source SIEM Stack☆98Updated 4 months ago
- A simple application that extracts your IoCs from garbage input and checks their reputation using multiple CTI services.☆439Updated this week
- Open source defense for your entire stack☆175Updated this week
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆317Updated this week
- Add a layer of active defense to your cloud applications.☆93Updated last week
- Useful scripts for those administering Wazuh☆84Updated 3 weeks ago
- 🤖 Admyral enables continuous control monitoring for any custom control☆331Updated 7 months ago
- MasterParser is a powerful DFIR tool designed for analyzing and parsing Linux logs☆733Updated 3 months ago
- NethSecurity image and build environment☆144Updated this week
- T-Guard Repository☆16Updated last year
- Logging Made Easy (LME) is a no cost, open source platform that centralizes log collection, enhances threat detection, and enables real-t…☆1,064Updated last week
- Advanced Wazuh Rules for more accurate threat detection. Feel free to implement within your own Wazuh environment, contribute, or fork!☆802Updated last week
- A website and framework for testing NIDS detection☆266Updated 9 months ago
- Linux Security and Monitoring Scripts☆324Updated 9 months ago
- ☆262Updated 7 months ago
- OpenCTI–Wazuh connector looking for indicators in Wazuh and creating sightings☆18Updated 11 months ago
- Deep Linux runtime visibility meets Wireshark☆292Updated 3 weeks ago
- Docker helper files for running eramba software☆48Updated last month
- A production ready Dockered MISP☆255Updated last week
- Command line tool designed to set up, start and maintain Clear NDR installation.☆23Updated this week
- ISO 27001 certification requires organizations to prove their compliance with the Standard with appropriate documentation, which can run …☆97Updated 5 years ago
- Streamline vulnerability patching with CVSS, EPSS, and CISA's Known Exploited Vulnerabilities. Prioritize actions based on real-time thre…☆654Updated 3 months ago
- Open Adversary Exposure Validation Platform☆1,077Updated this week
- Integrate your Wazuh-Manager or Graylog with the SOCFortress Threat Intel Service☆29Updated 9 months ago