OpenSecureCo / Demos
Repo Filled With Follow Along Guides
☆74Updated 2 years ago
Alternatives and similar repositories for Demos:
Users that are interested in Demos are comparing it to the libraries listed below
- ☆31Updated 3 years ago
- Convert Sigma rules to Wazuh rules☆64Updated 11 months ago
- ☆33Updated last year
- Wazuh integration TheHive☆35Updated 2 years ago
- Docker configurations for TheHive, Cortex and 3rd party tools☆119Updated 2 years ago
- Repository resource for threat hunter☆158Updated 6 years ago
- A Ruleset to enhance detection capabilities of Ossec using Sysmon☆91Updated 2 years ago
- Docker image for Velocidex Velociraptor☆122Updated 2 weeks ago
- ☆52Updated this week
- Integrate your Wazuh-Manager or Graylog with the SOCFortress Threat Intel Service☆28Updated 5 months ago
- MISP Playbooks☆188Updated last month
- Docker image for MISP☆123Updated 2 months ago
- Blue Team detection lab created with Terraform and Ansible in Azure.☆149Updated 4 months ago
- SIEGMA - Transform Sigma rules into SIEM consumables☆149Updated last week
- Resources To Learn And Understand SIGMA Rules☆173Updated 2 years ago
- ☆15Updated 2 years ago
- Security Onion + Automation + Response Lab including n8n and Velociraptor☆107Updated 2 years ago
- (Unofficial) Wazuh integration to send alerts to IRIS.☆17Updated 2 months ago
- Run Velociraptor on Security Onion☆37Updated 2 years ago
- ☆19Updated 3 years ago
- This is the One Stop place where you can several Detection Rules which can help you to kick start your journey on SIEM, SOC work.☆38Updated 3 years ago
- A production ready Dockered MISP☆212Updated last week
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆201Updated 2 years ago
- Useful scripts for those administering Wazuh☆80Updated 2 months ago
- MAD ATT&CK Defender: ATT&CK Adversary Emulation Repository☆112Updated last year
- These are open source rules that can be utilized with QRadar to detect various types of threats in the environment.☆54Updated 5 years ago
- Cyber Threat Intelligence Data, Indicators, and Analysis☆84Updated 3 months ago
- This code snippet retrieves Azure Sentinel rules that are mapped to MITRE ATT&CK Framework and generates the related MITRE D3FEND defense…☆71Updated 3 years ago
- A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the…☆61Updated 2 years ago
- Pwnspoof repository☆258Updated last year