Hestat / ossec-sysmon
A Ruleset to enhance detection capabilities of Ossec using Sysmon
☆88Updated 2 years ago
Alternatives and similar repositories for ossec-sysmon:
Users that are interested in ossec-sysmon are comparing it to the libraries listed below
- Convert Sigma rules to Wazuh rules☆63Updated 10 months ago
- Sysmon and wazuh integration with Sigma sysmon rules [updated]☆64Updated 3 years ago
- SIEGMA - Transform Sigma rules into SIEM consumables☆146Updated last year
- Docker image for Velocidex Velociraptor☆118Updated 7 months ago
- OSSEM Detection Model☆175Updated 2 years ago
- Run Velociraptor on Security Onion☆37Updated 2 years ago
- Anything Sysmon related from the MSTIC R&D team☆149Updated 8 months ago
- Security Onion + Automation + Response Lab including n8n and Velociraptor☆107Updated 2 years ago
- A Sigma to Wazuh / OSSEC converter including a generated Windows Sysmon ruleset☆33Updated 4 years ago
- A curated list of awesome things related to TheHive & Cortex☆175Updated 3 years ago
- Pointing cybersecurity teams to thousands of detection rules and offensive security tests aligned with common attacker techniques☆131Updated 11 months ago
- Technical add-on for Splunk related to TheHive/Cortex from TheHive project☆52Updated 3 weeks ago
- Threat Hunting & Incident Investigation with Osquery☆205Updated 2 years ago
- Pathfinder is a plugin for mapping network vulnerabilities, scanned by CALDERA or imported by a supported network scanner, and translatin…☆126Updated 9 months ago
- Sigma rules from Joe Security☆206Updated 3 months ago
- SIGMA UI is a free open-source application based on the Elastic stack and Sigma Converter (sigmac)☆185Updated 3 years ago
- Rules generated from our investigations.☆193Updated 3 months ago
- Dettectinator - The Python library to your DeTT&CT YAML files.☆108Updated last month
- evtx-hunter helps to quickly spot interesting security-related activity in Windows Event Viewer (EVTX) files.☆150Updated 3 years ago
- Docker image for MISP☆122Updated last month
- A Splunk App containing Sigma detection rules, which can be updated from a Git repository.☆108Updated 5 years ago
- Collection of walkthroughs on various threat hunting techniques☆75Updated 4 years ago
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆200Updated 2 years ago
- Repository for SPEED SIEM Use Case Framework☆53Updated 4 years ago
- ☆123Updated last year
- The principal objective of this project is to develop a knowledge base of the tactics, techniques, and procedures (TTPs) used by insiders…☆142Updated 5 months ago
- Test the accuracy of Endpoint Detection and Response (EDR) software with simple script which executes various ATT&CK/LOLBAS/Invoke-Cradle…☆296Updated 3 years ago
- ☆83Updated last month
- Detection Ideas & Rules repository.☆179Updated 3 years ago
- an excel-centric approach for the MITRE ATT&CK® Tactics and Techniques☆183Updated 2 years ago