security-onion VS cyberchef-recipes

Compare security-onion vs cyberchef-recipes and see what are their differences.

security-onion

Security Onion 16.04 - Linux distro for threat hunting, enterprise security monitoring, and log management (by Security-Onion-Solutions)
Our great sponsors
  • WorkOS - The modern identity platform for B2B SaaS
  • InfluxDB - Power Real-Time Data Analytics at Scale
  • SaaSHub - Software Alternatives and Reviews
security-onion cyberchef-recipes
3 4
2,900 1,881
- -
3.9 0.0
about 3 years ago over 1 year ago
- -
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

security-onion

Posts with mentions or reviews of security-onion. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2022-02-02.

cyberchef-recipes

Posts with mentions or reviews of cyberchef-recipes. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2021-06-19.

What are some alternatives?

When comparing security-onion and cyberchef-recipes you can also consider the following projects:

Wazuh - Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.

CyberChef - The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis

DetectionLab - Automate the creation of a lab environment complete with security tooling and logging best practices

Sending your docker logs - Sending logs from docker containers to Logit.io

tpotce - 🍯 T-Pot - The All In One Honeypot Platform 🐝

Microsoft-365-Defender-Hunting-Queries - Sample queries for Advanced hunting in Microsoft 365 Defender

snort-rules - An UNOFFICIAL Git Repository of Snort Rules(IDS rules) Releases. [UnavailableForLegalReasons - Repository access blocked]

awesome-incident-response - A curated list of tools for incident response

awesome-pentest - A collection of awesome penetration testing resources, tools and other shiny things

FCL - FCL (Fileless Command Lines) - Known command lines of fileless malicious executions

Suricata - Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine developed by the OISF and the Suricata community.

ThreatHunting_with_Osquery - Threat Hunting & Incident Investigation with Osquery