OpenSecureCo / DemosLinks
Repo Filled With Follow Along Guides
☆80Updated 3 years ago
Alternatives and similar repositories for Demos
Users that are interested in Demos are comparing it to the libraries listed below
Sorting:
- Docker configurations for TheHive, Cortex and 3rd party tools☆128Updated 3 years ago
- Wazuh integration TheHive☆41Updated 2 years ago
- ☆40Updated 2 years ago
- This project is a SIEM with SIRP and Threat Intel, all in one.☆460Updated last year
- ☆32Updated 4 years ago
- OpenCTI Docker deployment helpers☆214Updated last week
- A Ruleset to enhance detection capabilities of Ossec using Sysmon☆94Updated 3 years ago
- Integrate your Wazuh-Manager or Graylog with the SOCFortress Threat Intel Service☆32Updated last year
- Convert Sigma rules to Wazuh rules☆73Updated 4 months ago
- ☆20Updated 2 years ago
- Useful scripts for those administering Wazuh☆90Updated 2 weeks ago
- A production ready Dockered MISP☆306Updated this week
- Docker image for MISP☆136Updated last week
- Standard-Format Threat Intelligence Feeds☆125Updated this week
- Docker image for Velocidex Velociraptor☆142Updated 3 weeks ago
- Sysmon and wazuh integration with Sigma sysmon rules [updated]☆71Updated 4 years ago
- SECMON is a web-based tool for the automation of infosec watching and vulnerability management with a web interface.☆218Updated 3 years ago
- Cyber Incident Response Team Playbook Battle Cards☆425Updated last year
- Repository resource for threat hunter☆158Updated 7 years ago
- Security Onion + Automation + Response Lab including n8n and Velociraptor☆112Updated 3 years ago
- Repo to hold wazuh manager mcp server☆71Updated 3 months ago
- MISP Playbooks☆221Updated 3 months ago
- Cyber Threat Intelligence Data, Indicators, and Analysis☆107Updated last month
- ☆61Updated last week
- ☆219Updated last year
- Zeek-Formatted Threat Intelligence Feeds☆382Updated this week
- OpenCTI–Wazuh connector looking for indicators in Wazuh and creating sightings☆22Updated last year
- A powerful and user-friendly browser extension that streamlines investigations for security professionals.☆414Updated 8 months ago
- Threat Hunting tool about Sysmon and graphs☆335Updated 2 years ago
- How to setup a honeypot with an IDS, ELK and TLS traffic inspection☆164Updated 3 years ago