Neo23x0 / auditdLinks
Best Practice Auditd Configuration
☆1,739Updated last month
Alternatives and similar repositories for auditd
Users that are interested in auditd are comparing it to the libraries listed below
Sorting:
- Transform Linux Audit logs for SIEM usage☆809Updated last month
- Linux audit userspace repository☆689Updated last week
- Configuration files for the SOF-ELK VM☆1,709Updated last week
- A Linux Auditd rule set mapped to MITRE's Attack Framework☆823Updated 5 years ago
- A Suricata based NDR distribution☆1,586Updated 4 months ago
- PCI-DSS compliant Debian 11/12 hardening☆972Updated last week
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆2,311Updated last week
- Digging Deeper....☆3,678Updated this week
- Detect Tactics, Techniques & Combat Threats☆2,256Updated 2 months ago
- A repository of sysmon configuration modules☆2,949Updated last year
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,510Updated this week
- Create actionable data from your Vulnerability Scans☆1,394Updated 3 years ago
- Cortex: a Powerful Observable Analysis and Active Response Engine☆1,533Updated last month
- The Hunting ELK☆3,901Updated last year
- A utility to safely generate malicious network traffic patterns and evaluate controls.☆1,347Updated last year
- UAC is a powerful and extensible incident response tool designed for forensic investigators, security analysts, and IT professionals. It …☆1,222Updated this week
- Sysmon for Linux☆2,051Updated 6 months ago
- Re-play Security Events☆1,710Updated last year
- Your Everyday Threat Intelligence☆1,943Updated 2 months ago
- Simple Bash IOC Scanner☆772Updated 3 years ago
- A repository for using osquery for incident detection and response☆877Updated 4 months ago
- Wazuh - Ruleset☆499Updated last year
- Collaborative Incident Response platform☆1,362Updated this week
- A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data int…☆2,412Updated this week
- A website and framework for testing NIDS detection☆311Updated 6 months ago
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆448Updated last week
- Incident Response Documentation made easy. Developed by Incident Responders for Incident Responders☆956Updated 2 years ago
- Open Source Security Events Metadata (OSSEM)☆1,283Updated 2 years ago
- Advanced Wazuh Rules for more accurate threat detection. Feel free to implement within your own Wazuh environment, contribute, or fork!☆1,195Updated this week
- Real-time, container-based file scanning at enterprise scale☆969Updated this week