setup wazuh to serve multiple organizations on a single instance.
☆12Dec 29, 2023Updated 2 years ago
Alternatives and similar repositories for wazuh_multi_tenant
Users that are interested in wazuh_multi_tenant are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆25Jul 27, 2023Updated 2 years ago
- A GLPI plugin that allows customization of logos, background and custom CSSs☆24Feb 6, 2026Updated 3 months ago
- Deploying of infrastructure and technologies for a SOC as a Service ( SOCasS)☆14Apr 10, 2020Updated 6 years ago
- Vulnerable Windows Server 2012 VM made for practicing certain Active Directory attacks.☆24Jun 13, 2023Updated 2 years ago
- Our collection of Wazuh detection rules for our Offense Lab☆20Feb 13, 2022Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Various Docker Compose profiles to set up TheHive and Cortex for different use cases☆17Feb 6, 2026Updated 3 months ago
- MavLink Protocol Drone Exploiting Tool☆16Aug 24, 2024Updated last year
- Yet Another List of Educational Tools☆11Apr 7, 2026Updated last month
- This sample Kibana custom visualization plugin, based on the NP framework, allows enhancement via simple coding of a simple UI to adjust …☆15Oct 14, 2022Updated 3 years ago
- Kubernetes, Clusters and Dockers Enumeration in GCP and AWS environments☆12Nov 23, 2023Updated 2 years ago
- ☆15Dec 6, 2023Updated 2 years ago
- Software para reconhecimento de fala para texto☆13Dec 8, 2022Updated 3 years ago
- ☆15Oct 6, 2022Updated 3 years ago
- The malsource dataset☆12Aug 31, 2021Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Comunidade Brasileira de Cibersegurança☆25Oct 6, 2025Updated 7 months ago
- A script that checks a bunch of obvious cyber-security stuff in order to try and compromise a host through it's open services.☆13Apr 17, 2022Updated 4 years ago
- VTC - Velociraptor Timeline Creator☆19May 15, 2024Updated last year
- ☆29May 19, 2015Updated 10 years ago
- Ethical hacking, CTF, tools & etc☆22Feb 13, 2021Updated 5 years ago
- Wazuh decoder for mikrotik logs and monitoring login/logout wireguard peers☆36Jun 19, 2024Updated last year
- Kubernetes Enterprise storage vibes for your homelab. A single-binary CSI driver that turns any Linux box with a btrfs disk into a full-f…☆41May 4, 2026Updated last week
- Simple Shellcode Runner in Rust Language☆18Dec 8, 2023Updated 2 years ago
- Flipper Zero Bad USB Repository and some extras for everyone to learn and use their flipper, and maybe create some scripts☆50Dec 10, 2024Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- EnumDNS is a modular DNS reconnaissance tool capable of resolving hosts from various sources, including wordlists, BloodHound files, and …☆21Mar 9, 2026Updated 2 months ago
- Cookiecutter template for Salt formulas☆15Nov 7, 2018Updated 7 years ago
- Django middleware and signals for handling security events☆14Apr 14, 2021Updated 5 years ago
- Honeypot FTP server written in .NET Core (C#) for both Linux and Windows.☆14Dec 8, 2022Updated 3 years ago
- This is a smart contract tutorial, this tutorial guide you how to compile & deploy a mintable ERC20 token smart contract using client sid…☆13Oct 6, 2018Updated 7 years ago
- C# Process Hollowing POC☆19Jan 5, 2023Updated 3 years ago
- ☆12Nov 2, 2017Updated 8 years ago
- Base OKE automated deployment with extras, to be used alone or by other Quickstarts☆13Jun 20, 2025Updated 10 months ago
- ☆22Apr 14, 2026Updated 3 weeks ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆27Apr 23, 2024Updated 2 years ago
- WinHTTP example☆17Feb 6, 2016Updated 10 years ago
- Archive of Metasploit CTF challenges.☆14Jan 21, 2022Updated 4 years ago
- Git-eXposed is a tool designed to detect and extract sensitive information from exposed Git repositories☆11Sep 26, 2024Updated last year
- Automated solution for nmap'ing☆27May 17, 2023Updated 2 years ago
- rootkit for tryhackme king of the hill☆12Apr 7, 2024Updated 2 years ago
- ☆19Oct 20, 2021Updated 4 years ago