There are 52 repositories under siem topic.
Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.
Free and open log management
Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability in long term operations.
Digital Forensics Guide. Learn all about Digital Forensics, Computer Forensics, Mobile device Forensics, Network Forensics, and Database Forensics.
🐳 Elastic Stack (ELK) v8+ on Docker with Compose. Pre-configured out of the box to enable Logging, Metrics, APM, Alerting, ML, and SIEM features. Up with a Single Command.
Open source security data lake for threat hunting, detection & response, and cybersecurity analytics at petabyte scale on AWS
A collection of sources of documentation, as well as field best practices, to build/run a SOC
Awesome Security lists for SOC/CERT/CTI
Tools to rapidly deploy a threat hunting capability on Azure Sentinel that leverages Sysmon and MITRE ATT&CK
Open Source Security Guide. Learn all about Security Standards (FIPS, CIS, FedRAMP, FISMA, etc.), Frameworks, Threat Models, Encryption, and Benchmarks.
A collective list of public APIs for use in security. Contributions welcome
Configuration guidance for implementing collection of security relevant Windows Event Log events by using Windows Event Forwarding. #nsacyber
Advanced Sysmon ATT&CK configuration focusing on Detecting the Most Techniques per Data source in MITRE ATT&CK, Provide Visibility into Forensic Artifact Events for UEBA, Detect Exploitation events with wide CVE Coverage, and Risk Scoring of CVE, UEBA, Forensic, and MITRE ATT&CK Events.
Transform Linux Audit logs for SIEM usage
SIEM Tactics, Techiques, and Procedures
Awesome list of keywords and artifacts for Threat Hunting sessions
Set of EVTX samples (>270) mapped to MITRE ATT&CK tactic and techniques to measure your SIEM coverage or developed new use cases.
A little tool to play with Azure Identity - Azure and Entra ID lab creation tool. Blog: https://medium.com/@iknowjason/sentinel-for-purple-teaming-183b7df7a2f4
select * from logs; Tailpipe is an open source SIEM for instant log insights, powered by DuckDB. Analyze millions of events in seconds, right from your terminal.
A collection of PowerShell modules designed for artifact gathering and reconnaisance of Windows-based endpoints.
A robust, and flexible open source User & Entity Behavior Analytics (UEBA) framework used for Security Analytics. Developed with luv by Data Scientists & Security Analysts from the Cyber Security Industry. [PRE-ALPHA]
Built-in Panther detection rules and policies
A datasource assessment on an event level to show potential coverage or the MITRE ATT&CK framework
Enterprise-ready SIEM, SOAR and Compliance powered by real-time correlation and threat intelligence.
Splunk code (SPL) for serious threat hunters and detection engineers.
Microsoft Sentinel SOC Operations
Repository with Sample KQL Query examples for Threat Hunting