Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science
-
Updated
Nov 1, 2024 - Shell
Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science
A curated toolkit and knowledge base for SIEM using Elasticsearch, Kibana, and Zeek. Dive into log analysis, anomaly detection, for SOC and SIEM practices.
A Zeek log writer plugin that publishes to Kafka.
Scripts written in BASH, PowerShell, Python, and other languages.
Spicy-based IGMP packet analyzer for Zeek
This system is a combination of 3 open-source tools that include Zeek for Intrusion Detection System (IDS), StratosphereIPS for the machine learning Process, and ELK Stack for log management and SIEM.
A dockerized demo for illustrating how Confluent can be used in a SIEM Modernization use case.
Cyber threat detection and analysis platform
Alpine Linux based Filebeat Docker Image
Add a description, image, and links to the zeek topic page so that developers can more easily learn about it.
To associate your repository with the zeek topic, visit your repo's landing page and select "manage topics."