All Projects → kitabisa → Teler

kitabisa / Teler

Licence: apache-2.0
Real-time HTTP Intrusion Detection

Programming Languages

go
31211 projects - #10 most used programming language
golang
3204 projects

Projects that are alternatives of or similar to Teler

Meerkat
A collection of PowerShell modules designed for artifact gathering and reconnaisance of Windows-based endpoints.
Stars: ✭ 284 (-77.24%)
Mutual labels:  log, threat-hunting, threat
Siem
SIEM Tactics, Techiques, and Procedures
Stars: ✭ 157 (-87.42%)
Mutual labels:  log, threat-hunting, threat
Threatbus
🚌 The missing link to connect open-source threat intelligence tools.
Stars: ✭ 139 (-88.86%)
Mutual labels:  ids, threat-hunting, threat-intelligence
Patrowlhears
PatrowlHears - Vulnerability Intelligence Center / Exploits
Stars: ✭ 89 (-92.87%)
Mutual labels:  threat-hunting, threat-intelligence, threat
WELA
WELA (Windows Event Log Analyzer): The Swiss Army knife for Windows Event Logs! ゑ羅(ウェラ)
Stars: ✭ 442 (-64.58%)
Mutual labels:  log, logs, threat
Patrowlmanager
PatrOwl - Open Source, Smart and Scalable Security Operations Orchestration Platform
Stars: ✭ 363 (-70.91%)
Mutual labels:  threat-hunting, threat-intelligence
Awesome Cybersecurity Datasets
A curated list of amazingly awesome Cybersecurity datasets
Stars: ✭ 380 (-69.55%)
Mutual labels:  ids, logs
Klara
Kaspersky's GReAT KLara
Stars: ✭ 565 (-54.73%)
Mutual labels:  threat-hunting, threat-intelligence
Sysmontools
Utilities for Sysmon
Stars: ✭ 903 (-27.64%)
Mutual labels:  threat-hunting, threat-intelligence
Fail2ban
Daemon to ban hosts that cause multiple authentication errors
Stars: ✭ 6,677 (+435.02%)
Mutual labels:  ids, intrusion-detection
Wazuh Chef
Wazuh - Chef cookbooks
Stars: ✭ 9 (-99.28%)
Mutual labels:  ids, intrusion-detection
Watcher
Watcher - Open Source Cybersecurity Threat Hunting Platform. Developed with Django & React JS.
Stars: ✭ 324 (-74.04%)
Mutual labels:  threat-hunting, threat-intelligence
Misp
MISP (core software) - Open Source Threat Intelligence and Sharing Platform
Stars: ✭ 3,485 (+179.25%)
Mutual labels:  threat-hunting, threat-intelligence
Threatingestor
Extract and aggregate threat intelligence.
Stars: ✭ 439 (-64.82%)
Mutual labels:  threat-hunting, threat-intelligence
Wazuh Ruleset
Wazuh - Ruleset
Stars: ✭ 305 (-75.56%)
Mutual labels:  ids, intrusion-detection
Vfeed
The Correlated CVE Vulnerability And Threat Intelligence Database API
Stars: ✭ 826 (-33.81%)
Mutual labels:  threat-intelligence, threat
Serverless Es Logs
A Serverless plugin to transport logs to ElasticSearch
Stars: ✭ 51 (-95.91%)
Mutual labels:  log, logs
Besafe
BeSafe is robust threat analyzer which help to protect your desktop environment and know what's happening around you
Stars: ✭ 21 (-98.32%)
Mutual labels:  threat-hunting, threat-intelligence
Ioc Explorer
Explore Indicators of Compromise Automatically
Stars: ✭ 73 (-94.15%)
Mutual labels:  threat-hunting, threat-intelligence
Malware Feed
Bringing you the best of the worst files on the Internet.
Stars: ✭ 69 (-94.47%)
Mutual labels:  threat-hunting, threat-intelligence

teler

teler

Kitabisa SecLab License made with Go Release Platform GitHub issues

Real-time HTTP Intrusion Detection
Contribute · What's new · Report Bug · Request Feature


teler is an real-time intrusion detection and threat alert based on web log that runs in a terminal with resources that we collect and provide by the community. ❤️

teler

Table of Contents

Features

  • Real-time: Analyze logs and identify suspicious activity in real-time.

  • Alerting: teler provides alerting when a threat is detected, push notifications include Slack, Telegram and Discord.

  • Monitoring: We've our own metrics if you want to monitor threats easily, and we use Prometheus for that.

  • Latest resources: Collections is continuously up-to-date.

  • Minimal configuration: You can just run it against your log file, write the log format and let teler analyze the log and show you alerts!

  • Flexible log formats: teler allows any custom log format string! It all depends on how you write the log format in configuration file.

  • Incremental log processing: Need data persistence rather than buffer stream? teler has the ability to process logs incrementally through the on-disk persistence options.

Why teler?

teler was designed to be a fast, terminal-based threat analyzer. Its core idea is to quickly analyze and hunt threats in real time!

Demo

Here is a preview of teler with conditions of use as:

Buffer-streams Incremental

Documentation

All related documentation about installation, usage & configuration is on our Wiki page.

Supporting Materials

Contributors

contributions

This project exists thanks to all the people who contribute. To learn how to setup a development environment and for contribution guidelines, see CONTRIBUTING.md.


Dwi Siswanto

💻 📖 ⚠️ 🤔

ProjectDiscovery

🔧

Anton Egorov

🔧

0ktavandi

🤔

Fik

🎨

fairyhunter13

⚠️

Zufar Dhiyaulhaq

💻

Aldin Setiawan

💻

Noah Petherbridge

🔧

Zackky Muhammad

🚇

Andy

🔧

Aliaksandr Valialkin

🔧

Markus Tenghamn

🐛

Rick

🚧 💻

Michael BOUVY

📖

oelnaggar

📖 🐛

Resources

All external resources used in this teler are NOT provided by us. See all peoples who involved in this resources at teler Resource Collections.

Pronunciation

/télér/ bagaimana bisa seorang pemuda itu teler hanya dengan meminum 1 sloki ciu (?)

Changes

For changes, see the CHANGELOG.md.

License

This program is free software: you can redistribute it and/or modify it under the terms of the Apache license. Kitabisa teler and any contributions are Copyright © by Dwi Siswanto 2020.

Stargazers over time

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].