OpenSecureCo / Wazuh
☆31Updated 3 years ago
Alternatives and similar repositories for Wazuh:
Users that are interested in Wazuh are comparing it to the libraries listed below
- Cybersecurity Incident Response Plan☆90Updated 4 years ago
- These are open source rules that can be utilized with QRadar to detect various types of threats in the environment.☆55Updated 5 years ago
- Tools for simulating threats☆183Updated last year
- This is the One Stop place where you can find almost all of your Tools of Requirements in DFIR☆78Updated 3 years ago
- Run Velociraptor on Security Onion☆37Updated 2 years ago
- Repository of public reference frameworks for the DFIR community.☆116Updated last year
- ☆42Updated 2 years ago
- This is the One Stop place where you can several Detection Rules which can help you to kick start your journey on SIEM, SOC work.☆38Updated 3 years ago
- Repository resource for threat hunter☆158Updated 6 years ago
- Convert Sigma rules to Wazuh rules☆64Updated last year
- Resources To Learn And Understand SIGMA Rules☆174Updated 2 years ago
- Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D. Azure and AWS terraform support.☆134Updated 2 years ago
- links collected from SOC Core Skills class☆85Updated 4 years ago
- SIEGMA - Transform Sigma rules into SIEM consumables☆149Updated last month
- Docker image for Velocidex Velociraptor☆126Updated 2 months ago
- A Ruleset to enhance detection capabilities of Ossec using Sysmon☆92Updated 3 years ago
- MISP to Sentinel integration☆67Updated last month
- MISP Playbooks☆199Updated 2 months ago
- ☆34Updated last year
- Practical Threat Detection Engineering, Published by Packt☆68Updated last year
- Some Threat Hunting queries useful for blue teamers☆125Updated 2 years ago
- This code snippet retrieves Azure Sentinel rules that are mapped to MITRE ATT&CK Framework and generates the related MITRE D3FEND defense…☆71Updated 3 years ago
- This repository contains Splunk queries to hunt some anomalies☆42Updated 2 years ago
- Repository for SPEED SIEM Use Case Framework☆53Updated 5 years ago
- A collection of various SIEM rules relating to malware family groups.☆66Updated 10 months ago
- A list of Splunk queries that I've collected and used over time.☆81Updated 4 years ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆70Updated last year
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆40Updated last year
- Resources for SANS CTI Summit 2021 presentation☆102Updated last year
- Cyber Incident Response Team Playbook Battle Cards☆375Updated 11 months ago