PurpleCloud
jupyter2kibana
PurpleCloud | jupyter2kibana | |
---|---|---|
1 | 4 | |
474 | 42 | |
- | - | |
5.5 | 0.0 | |
2 months ago | over 1 year ago | |
Python | Jupyter Notebook | |
MIT License | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
PurpleCloud
-
Anyone have experience building a Windows AD lab environment in Docker?
We looked into pre-configured, plug-and-play options. One project (leveraging Ansible) is called PurpleCloud. Probably because running even a handful of Windows VMs on a PC can get pretty slow, pretty fast, their project spins this network up on Azure. However, the estimated monthly cost of the cloud resources is not attractive; over $300 per month. While it's true that we would not need to run the lab every day resulting in lower cost, I think we would want to run new tests fairly often, especially if multiple analysts are using it (and I already know the burn of forgetting an EC2 instance on for a week or two).
jupyter2kibana
-
Outlining the pros and cons of threat hunting labs and threat sim frameworks on a hobbyist budget.
For context, if you didn't read the linked post, our team uses ELK stack as our SIEM, and a few of us wanted to set up a test lab to practice threat hunting on ELK. And we needed to do it on a Hobbyist budget. And we wanted to apply the data-science (inspired by this) strengths of Jupyter to our hunting workflow, since all of us already know Python.
-
Anyone have experience building a Windows AD lab environment in Docker?
Big picture: We want to work out an in-depth ELK workflow and develop some threat hunting automation. I found that a small ELK stack is hosted for a very reasonable price ($0.0263/hr for a small stack w/ 45GB storage as of today). And a CoCalc instance (collaborative cloud-hosted JupyterLab) costs another $6 per month. So between those two low-cost resources we've figured out a pretty neat Python -> Vega -> Kibana workflow to apply some data science and visualization to our threat-hunting workflow (after some trouble).
-
Python (Jupyter) -> Vega -> Kibana?
Here's the example referred to as well as the overarching project which inspired us to try this.
-
Resources
Elastic Eland (Python Elasticsearch client for exploring and analyzing data in Elasticsearch)
What are some alternatives?
invoke-atomicredteam - Invoke-AtomicRedTeam is a PowerShell module to execute tests as defined in the [atomics folder](https://github.com/redcanaryco/atomic-red-team/tree/master/atomics) of Red Canary's Atomic Red Team project.
HELK - The Hunting ELK
OpenSIEM-Logstash-Parsing - SIEM Logstash parsing for more than hundred technologies
jupyter-renderers - Renderers and renderer extensions for JupyterLab
ansible-pentest-deploy - Using Ansible as an orchestrator, this project is another solution for testers looking to configure and deploy a new VM or VPS box with the tools that they need for penetration testing.
nbdev - Create delightful software with Jupyter Notebooks
hashlookup-forensic-analyser - Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https://circl.lu/services/hashlookup/
fastpages - An easy to use blogging platform, with enhanced support for Jupyter Notebooks.