Hestat / ossec-sysmon
A Ruleset to enhance detection capabilities of Ossec using Sysmon
☆87Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for ossec-sysmon
- SIEGMA - Transform Sigma rules into SIEM consumables☆141Updated last year
- Sysmon and wazuh integration with Sigma sysmon rules [updated]☆61Updated 3 years ago
- A curated list of awesome things related to TheHive & Cortex☆173Updated 3 years ago
- Convert Sigma rules to Wazuh rules☆58Updated 7 months ago
- Anything Sysmon related from the MSTIC R&D team☆146Updated 5 months ago
- OSSEM Detection Model☆168Updated 2 years ago
- Technical add-on for Splunk related to TheHive/Cortex from TheHive project☆49Updated 3 weeks ago
- Sigma rules from Joe Security☆203Updated 2 weeks ago
- Docker configurations for TheHive, Cortex and 3rd party tools☆113Updated last year
- Docker image for Velocidex Velociraptor☆113Updated 4 months ago
- Pointing cybersecurity teams to thousands of detection rules and offensive security tests aligned with common attacker techniques☆123Updated 8 months ago
- Run Velociraptor on Security Onion☆34Updated 2 years ago
- A Sigma to Wazuh / OSSEC converter including a generated Windows Sysmon ruleset☆33Updated 4 years ago
- SIGMA UI is a free open-source application based on the Elastic stack and Sigma Converter (sigmac)☆184Updated 3 years ago
- Security Onion + Automation + Response Lab including n8n and Velociraptor☆105Updated 2 years ago
- This code snippet retrieves Azure Sentinel rules that are mapped to MITRE ATT&CK Framework and generates the related MITRE D3FEND defense…☆66Updated 3 years ago
- Build a attack range in your local machine☆130Updated last year
- evtx-hunter helps to quickly spot interesting security-related activity in Windows Event Viewer (EVTX) files.☆147Updated 2 years ago
- Suricata rules for network anomaly detection☆154Updated 2 months ago
- Rules generated from our investigations.☆189Updated 3 weeks ago
- S2AN - Mapper of Sigma/Suricata Rules/Signatures ➡️ MITRE ATT&CK Navigator☆84Updated last year
- A Splunk App containing Sigma detection rules, which can be updated from a Git repository.☆107Updated 4 years ago
- Threat Hunting & Incident Investigation with Osquery☆198Updated 2 years ago
- ATT&CK Remote Threat Hunting Incident Response☆198Updated 5 years ago
- ☆125Updated last year
- A (nearly) production ready Dockered MISP☆230Updated 10 months ago
- Set of SIGMA rules (>320) mapped to MITRE ATT&CK tactic and techniques☆310Updated 5 months ago
- an excel-centric approach for the MITRE ATT&CK® Tactics and Techniques☆181Updated 2 years ago
- OpenCTI Docker deployment helpers☆159Updated this week