rastrea2r alternatives
Looking for an alternative tool to replace rastrea2r? During the review of rastrea2r we looked at other open source tools. Based on their category, tags, and text, these are the ones that have the best match.
Alternatives (by score)
HELK (The Hunting ELK)
Introduction
The main purpose to use HELK is to do analytic research on data, which are typically the events coming from your systems. Suspicious events could be discovered by doing so-called threat hunting. It may give additional insights about the existing infrastructure and required security defenses.
Project details
Strengths and weaknesses
- + The source code of this software is available
Typical usage
- System monitoring
- Threat discovery
- Threat hunting
Loki
Introduction
Loki is security tool to find so-called indicators of compromise (IOC). It does this by scanning files and then uses pattern matching.Project details
Loki is written in Python.
Strengths and weaknesses
- + More than 10 contributors
- + Commercial support available
- + More than 500 GitHub stars
- + The source code of this software is available
Typical usage
- Digital forensics
- Intrusion detection
- Security monitoring
TheHive
Introduction
TheHive is scalable and a complete platform to deal with security incidents. It allows for collaboration between those responsible for dealing with such incidents and related events. It can even use the data of the MISP project, making it easier to start analyzing from there.
Project details
TheHive is written in Scala.
Strengths and weaknesses
- + More than 10 contributors
- + More than 500 GitHub stars
- + The source code of this software is available
Typical usage
- Digital forensics
- Incident response
- Intrusion detection
sqhunter
Introduction
Sqhunter is a security tool to find known and unknown threats within your network. The goal is to find possible adversaries within your network by doing specific queries. The tool uses data from osquery, Salt Open, and the Cymon API.
Project details
sqhunter is written in Python.
Strengths and weaknesses
- + The source code of this software is available
Typical usage
- Security monitoring
- Threat discovery
- Threat hunting
FIR (Fast Incident Response)
Introduction
FIR is an incident response tool written in the Django framework. It provides a web interface to deal with the creation and management of security-related incidents.Project details
Strengths and weaknesses
- + More than 10 contributors
- + The source code of this software is available
Typical usage
- Incident response
- Security monitoring
MISP
Introduction
MISP collects, stores, and distributes security indicators and discovered threats. This makes the platform useful for those involved with security incidents and malware research. Users benefit from having a well-tested platform to structure the vast number of data points available when it comes to security threats. The tooling allows interaction with other tools, like security incident and event management (SIEM) and intrusion detection systems (IDS).
Project details
MISP is written in PHP.
Strengths and weaknesses
- + More than 50 contributors
- + The source code of this software is available
Typical usage
- Fraud detection
- Information gathering
- Threat hunting
GRR Rapid Response
Introduction
The goal of the GRR tooling is to support digital forensics and investigations. By using a fast and scalable model, analysts can quickly perform their analysis. One of the main features is the ability to search for particular information or details. This process is called hunting.
Project details
GRR Rapid Response is written in Python.
Strengths and weaknesses
- + More than 25 contributors
- + More than 3000 GitHub stars
- + The source code of this software is available
- + Supported by a large company
Typical usage
- Digital forensics
- Intrusion detection
- Threat hunting
Suricata
Introduction
Suricata is a somewhat younger NIDS, though has a rapid development cycle. It can work with Snort rulesets, yet also has optimized rulesets for usage with Suricata itself. For example, this set is known as Emerging Threats and fully optimized.
Project details
Suricata is written in C, Lua.
Strengths and weaknesses
- + More than 50 contributors
- + The source code of this software is available
Typical usage
- Information gathering
- Intrusion detection
- Network analysis
- Threat discovery
Some relevant tool missing as an alternative to rastrea2r? Please contact us with your suggestion.