Neo23x0 / auditdLinks
Best Practice Auditd Configuration
☆1,627Updated 4 months ago
Alternatives and similar repositories for auditd
Users that are interested in auditd are comparing it to the libraries listed below
Sorting:
- Transform Linux Audit logs for SIEM usage☆766Updated 2 weeks ago
- A Linux Auditd rule set mapped to MITRE's Attack Framework☆792Updated 4 years ago
- Linux audit userspace repository☆650Updated this week
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆2,127Updated 2 weeks ago
- Cortex: a Powerful Observable Analysis and Active Response Engine☆1,429Updated 7 months ago
- A Suricata based IDS/IPS/NSM distro☆1,536Updated 9 months ago
- Wazuh - Ruleset☆448Updated 8 months ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,512Updated 10 months ago
- A repository for using osquery for incident detection and response☆849Updated 2 years ago
- Detect Tactics, Techniques & Combat Threats☆2,161Updated this week
- Configuration files for the SOF-ELK VM☆1,590Updated last month
- Digging Deeper....☆3,277Updated this week
- A repository of sysmon configuration modules☆2,786Updated 9 months ago
- DevSec Linux Baseline - InSpec Profile☆811Updated 9 months ago
- NIST Certified SCAP 1.2 toolkit☆1,508Updated 3 weeks ago
- A curated Cyber "Security Orchestration, Automation and Response (SOAR)" awesome list.☆864Updated 9 months ago
- Incident Response Documentation made easy. Developed by Incident Responders for Incident Responders☆906Updated last year
- Your Everyday Threat Intelligence☆1,860Updated 3 weeks ago
- ☆2,324Updated this week
- UAC is a powerful and extensible incident response tool designed for forensic investigators, security analysts, and IT professionals. It …☆978Updated last week
- Advanced Wazuh Rules for more accurate threat detection. Feel free to implement within your own Wazuh environment, contribute, or fork!☆746Updated 2 weeks ago
- Create actionable data from your Vulnerability Scans☆1,380Updated 2 years ago
- Incident Response Methodologies☆1,024Updated 6 years ago
- A utility to safely generate malicious network traffic patterns and evaluate controls.☆1,310Updated last year
- Mapping the MITRE ATT&CK Matrix with Osquery☆794Updated 2 years ago
- Windows Events Attack Samples☆2,365Updated 2 years ago
- TheHive: a Scalable, Open Source and Free Security Incident Response Platform☆3,672Updated 2 years ago
- The Hunting ELK☆3,838Updated 11 months ago
- Fast Incident Response☆1,881Updated last week
- YARA signature and IOC database for my scanners and tools☆2,629Updated last week