xeraa / auditbeat-in-action
Demo for Elastic's Auditbeat and SIEM
☆24Updated 3 years ago
Alternatives and similar repositories for auditbeat-in-action:
Users that are interested in auditbeat-in-action are comparing it to the libraries listed below
- ☆11Updated 6 years ago
- Expandable Defensive Cyber Operations Platform☆43Updated 2 years ago
- Now you won't miss the moment the domain expires.☆28Updated last week
- Vuls Beater for Elasticsearch - connecting vuls☆17Updated 4 years ago
- ☆11Updated 5 years ago
- Elasticsearch 2, 5 shell script backup utils.☆19Updated 6 years ago
- Various blog post projects.☆10Updated 7 months ago
- server for indexing and querying passive DNS observations☆45Updated last year
- Serverless, real-time, ClamAV+Yara scanning for your S3 Buckets☆31Updated 8 months ago
- ☆17Updated 8 months ago
- Kibana 5 Templates for Suricata IDPS☆43Updated 6 years ago
- ansible role to setup MISP, Malware Information Sharing Platform & Threat Sharing☆53Updated last month
- Reverse shell container for k8s deployments☆49Updated 4 years ago
- 📈 PerfTop: A client for the OpenSearch Performance Analyzer☆17Updated last year
- Mapping Corelight or Zeek data to Elastic Common Schema fields☆34Updated 2 months ago
- Ansible role to setup Falco, behavioral security with sysdig☆41Updated last week
- bro on debian with elasticsearch support☆24Updated 7 years ago
- Ubuntu 20.04 LTS | CIS Hardening Ansible Role☆9Updated 2 years ago
- Zeek package for tracking long connections to report them before they have completed.☆30Updated 2 years ago
- Build Automated Machine Images for MISP☆28Updated last year
- Understand OVAL results in a blink of an eye☆35Updated 2 years ago
- Python Packet Capture☆10Updated 10 years ago
- A Beat that monitors a local Nessus reports directory and outputs scan results to Elasticsearch or Logstash.☆31Updated 7 years ago
- Prototype system to monitor BGP routes and alert when anomalies are identified☆14Updated 6 years ago
- fast, extensible, versatile event router for Suricata's EVE-JSON format☆51Updated 6 months ago
- Use InSpec to run through the configurations from the OpenStack Security Guide.☆18Updated 5 months ago
- An Ansible playbook for deploying the Suricata intrusion detection system and fetching Snort rules with Oinkmaster.☆15Updated 3 years ago
- Enterprise Linux Exploit Mapper☆28Updated 7 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated 3 months ago
- Getting Started with ELK☆50Updated 9 years ago