Neo23x0 / auditdLinks
Best Practice Auditd Configuration
☆1,733Updated 3 weeks ago
Alternatives and similar repositories for auditd
Users that are interested in auditd are comparing it to the libraries listed below
Sorting:
- Transform Linux Audit logs for SIEM usage☆805Updated last week
- Linux audit userspace repository☆685Updated 2 weeks ago
- A Linux Auditd rule set mapped to MITRE's Attack Framework☆821Updated 5 years ago
- PCI-DSS compliant Debian 11/12 hardening☆957Updated last week
- A Suricata based NDR distribution☆1,584Updated 3 months ago
- A utility to safely generate malicious network traffic patterns and evaluate controls.☆1,346Updated last year
- A repository of sysmon configuration modules☆2,942Updated last year
- Configuration files for the SOF-ELK VM☆1,705Updated 2 weeks ago
- Detect Tactics, Techniques & Combat Threats☆2,249Updated last month
- UAC is a powerful and extensible incident response tool designed for forensic investigators, security analysts, and IT professionals. It …☆1,212Updated this week
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆2,302Updated last week
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,510Updated last year
- Digging Deeper....☆3,635Updated this week
- Wazuh - Ruleset☆494Updated last year
- A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data int…☆2,405Updated this week
- Cortex: a Powerful Observable Analysis and Active Response Engine☆1,525Updated last month
- Sysmon for Linux☆2,045Updated 5 months ago
- Collaborative Incident Response platform☆1,339Updated last month
- A repository for using osquery for incident detection and response☆875Updated 3 months ago
- YARA signature and IOC database for my scanners and tools☆2,823Updated last week
- Re-play Security Events☆1,706Updated last year
- Incident Response Documentation made easy. Developed by Incident Responders for Incident Responders☆954Updated 2 years ago
- Create actionable data from your Vulnerability Scans☆1,394Updated 2 years ago
- Mapping the MITRE ATT&CK Matrix with Osquery☆804Updated 2 years ago
- Simple Bash IOC Scanner☆773Updated 3 years ago
- Real-time, container-based file scanning at enterprise scale☆965Updated last week
- A website and framework for testing NIDS detection☆308Updated 5 months ago
- Splunk Security Content☆1,542Updated this week
- Advanced Wazuh Rules for more accurate threat detection. Feel free to implement within your own Wazuh environment, contribute, or fork!☆1,172Updated last week
- A toolset to make a system look as if it was the victim of an APT attack☆2,693Updated 3 months ago