OpenSecureCo / Demos
Repo Filled With Follow Along Guides
☆75Updated 2 years ago
Alternatives and similar repositories for Demos:
Users that are interested in Demos are comparing it to the libraries listed below
- ☆31Updated 3 years ago
- Docker configurations for TheHive, Cortex and 3rd party tools☆120Updated 2 years ago
- Convert Sigma rules to Wazuh rules☆64Updated last year
- ☆33Updated last year
- A Ruleset to enhance detection capabilities of Ossec using Sysmon☆92Updated 3 years ago
- Repository resource for threat hunter☆158Updated 6 years ago
- Wazuh integration TheHive☆35Updated 2 years ago
- Integrate your Wazuh-Manager or Graylog with the SOCFortress Threat Intel Service☆29Updated 6 months ago
- Sysmon and wazuh integration with Sigma sysmon rules [updated]☆65Updated 3 years ago
- This project is a SIEM with SIRP and Threat Intel, all in one.☆432Updated 4 months ago
- ☆53Updated last week
- ☆19Updated 3 years ago
- MISP Playbooks☆194Updated 2 months ago
- Docker image for Velocidex Velociraptor☆123Updated last month
- Security Onion + Automation + Response Lab including n8n and Velociraptor☆108Updated 2 years ago
- SECMON is a web-based tool for the automation of infosec watching and vulnerability management with a web interface.☆221Updated 3 years ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆106Updated 2 years ago
- ☆15Updated 2 years ago
- These are open source rules that can be utilized with QRadar to detect various types of threats in the environment.☆54Updated 5 years ago
- Blue Team detection lab created with Terraform and Ansible in Azure.☆153Updated 4 months ago
- Docker image for MISP☆125Updated 3 weeks ago
- Newly registered Domain Monitoring to detect phishing and brand impersonation with subdomain enumeration and source code scraping☆49Updated 2 months ago
- Zeek-Formatted Threat Intelligence Feeds☆359Updated this week
- Rapidly Search and Hunt through Linux Forensics Artifacts☆188Updated last year
- Cyber Threat Intelligence Data, Indicators, and Analysis☆84Updated 3 months ago
- Kibana 7 Templates for Suricata IDPS Threat Hunting☆40Updated 2 years ago
- Suricata rules for network anomaly detection☆159Updated 3 weeks ago
- Useful scripts for those administering Wazuh☆83Updated 3 months ago
- Collection of Suricata rule sets that I use modified to my environments.☆39Updated 4 years ago
- SIEM Cheat Sheet☆73Updated last year