13ihsan92 / Security-Blue-TeamLinks
This repository will describe the details surrounding the SIEM (wazuh) mini project, which will cover all aspects of topology design, deployment, rules, integration, and fine tune.
☆26Updated 2 years ago
Alternatives and similar repositories for Security-Blue-Team
Users that are interested in Security-Blue-Team are comparing it to the libraries listed below
Sorting:
- 🧰 Various PowerShell scripts for security, sysadmins, blue and red teams👫🏼☆44Updated 2 months ago
- a curated, categorised collection of useful projects 👨👩👧☆121Updated this week
- Useful scripts for those administering Wazuh☆87Updated last month
- Splunk add-on related to the PurpleLab tool☆41Updated last year
- ☆30Updated 2 years ago
- Wazuh integration TheHive☆40Updated 2 years ago
- Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Group☆86Updated 9 months ago
- Newly registered Domain Monitoring to detect phishing and brand impersonation with subdomain enumeration and source code scraping☆58Updated 2 weeks ago
- Integrate your Wazuh-Manager or Graylog with the SOCFortress Threat Intel Service☆30Updated last year
- A SOC Analyst's tool to automate the investigation & validation of possible Indicators of Compromise (IOCs) and perform various tasks inc…☆27Updated 3 years ago
- Meeps Security is a gamified cybersecurity training and awareness framework. In the game, players handle incoming calls about cybersecuri…☆18Updated 2 months ago
- Open-source powered SIEM, Vulnerability Scanning, Host- & Network-IDS. Built upon Elastic Stack, OpenVAS, Suricata. Wrapped in a Python F…☆16Updated 3 years ago
- 🚀 IRIS-SOAR: Modular SOAR (Security Orchestration, Automation, and Response) implementation in Python. Designed to complement DFIR-IRIS …☆11Updated last year
- Useful PowerShell one-liner (and some two-liner) commands☆24Updated 3 years ago
- A collection of scripts and configurations for hardening various systems and applications.☆24Updated last year
- This repository contains a script created by Truesec CSIRT team which can be used to identify signs of compromise and to some extent, mit…☆11Updated 4 years ago
- List of groups that are carrying out cyber actions in the conflict between Israel and Palestine.☆28Updated last year
- T-Guard Repository☆17Updated last year
- COMPLETE OSINT CHEAT-SHEET☆109Updated 2 weeks ago
- Run individual controls or full compliance benchmarks for CIS across all of your Microsoft 365 and Office 365 tenants using Powerpipe and…☆26Updated 2 weeks ago
- A walkthrough on how I set up Microsoft Server 2019 on a Virtual Machine to run Active Directory on it. I then configure a Domain Control…☆63Updated 2 years ago
- ☆19Updated 2 years ago
- ☆39Updated 2 years ago
- ☆22Updated 2 years ago
- Cyber Security Awareness Framework (CSAF)☆100Updated 7 months ago
- ☆52Updated 2 months ago
- An ongoing curated collection of awesome software, libraries, frameworks, talks & videos, best practices, learning tutorials and importan…☆20Updated 3 years ago
- With EmailAnalyzer you can analyze your suspicious emails. You can extract headers, links, and hashes from the .eml file and you can gene…☆277Updated 2 years ago
- A powerful home-lab focused on setting up Splunk SIEM and real-world use cases. If you’re interested to become SOC Analyst(Tier 1/2) , th…☆82Updated last year
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆103Updated last year