OpenSecureCo / Wazuh-Rules-1
Advanced Wazuh Rules for more accurate threat detection. Feel free to implement within your own Wazuh environment, contribute, or fork!
☆12Updated 2 years ago
Alternatives and similar repositories for Wazuh-Rules-1:
Users that are interested in Wazuh-Rules-1 are comparing it to the libraries listed below
- ☆31Updated 3 years ago
- ☆204Updated 8 months ago
- Integrate your Wazuh-Manager or Graylog with the SOCFortress Threat Intel Service☆28Updated 3 months ago
- Repo Filled With Follow Along Guides☆72Updated 2 years ago
- SOCFortress CoPilot☆238Updated this week
- Useful scripts for those administering Wazuh☆79Updated this week
- ☆33Updated last year
- Wazuh integration TheHive☆33Updated last year
- Configurations to implement Wazuh☆11Updated 2 years ago
- Newly registered Domain Monitoring to detect phishing and brand impersonation with subdomain enumeration and source code scraping☆46Updated 3 months ago
- (Unofficial) Wazuh integration to send alerts to IRIS.☆16Updated 2 weeks ago
- Open Source SIEM Stack☆70Updated last month
- MISP Playbooks☆182Updated last month
- Pwnspoof repository☆257Updated last year
- SIEM Cheat Sheet☆73Updated last year
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆214Updated last year
- ThreatSeeker: Threat Hunting via Windows Event Logs☆116Updated last year
- An automated Breach and Attack Simulation lab with terraform. Built for IaC stability, consistency, and speed.☆178Updated 6 months ago
- ☆42Updated last year
- A collection of awesome tools, software, libraries, learning tutorials & videos, frameworks, best practices and technical resources abou…☆48Updated 2 years ago
- Domain_checker application is the trial/demo version for the new EASM (External Attack Surface Management) system called HydrAttack (hydr…☆186Updated 8 months ago
- Speed up your pentest enumeration☆82Updated 3 weeks ago
- ☆160Updated 10 months ago
- ☆94Updated this week
- NIST CSF Maturity Toolkit☆35Updated 3 months ago
- An open-source self-hosted purple team management web application.☆247Updated 3 weeks ago
- ☆15Updated last year
- Repository resource for threat hunter☆158Updated 6 years ago
- Playbooks for SOC Analysts☆393Updated 2 years ago
- SECMON is a web-based tool for the automation of infosec watching and vulnerability management with a web interface.☆220Updated 2 years ago