HELK (The Hunting ELK)

LSE top 100LSE top 100HELK (65)HELK (65)

Tool and Usage

Project details
LicenseBSD 3-clause
AuthorRoberto Rodriguez
Latest release0.1.7a3042019 []

Project health

80
This score is calculated by different factors, like project age, last release date, etc.

Why this tool?

The main purpose to use HELK is to do analytic research on data, which are typically the events coming from your systems. Suspicious events could be discovered by doing so-called threat hunting. It may give additional insights about the existing infrastructure and required security defenses.

Usage and audience

HELK is commonly used for system monitoring, threat discovery, or threat hunting. Target users for this tool are security professionals.

Features

  • Tool allows multiple integrations

Tool review and remarks

The review and analysis of this project resulted in the following remarks for this security tool:

Strengths

  • + The source code of this software is available

Author and Maintainers

HELK is under development by Roberto Rodriguez.

Installation

Supported operating systems

HELK is known to work on Linux.

HELK alternatives

Similar tools to HELK:

64

rastrea2r

Rastrea2r is a threat hunting utility for indicators of compromise (IOC) and can be used by SOC analysts and incident responders. Learn how it works in this review.

100

MISP

MISP is short for Malware Information Sharing Platform. It helps with sharing threat data which can be used by defenders and malware researchers.

64

sqhunter

Sqhunter performs threat hunting in your environment. It runs on the salt master node and queries open network sockets, among other information.

All HELK alternatives

This tool page was updated at . Found an improvement? Help the community by submitting an update.

Related tool information

Categories

This tool is categorized as a threat hunting tool.