Advanced Wazuh Rules for more accurate threat detection. Feel free to implement within your own Wazuh environment, contribute, or fork!
☆13Aug 19, 2022Updated 3 years ago
Alternatives and similar repositories for Wazuh-Rules-1
Users that are interested in Wazuh-Rules-1 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆32Dec 12, 2021Updated 4 years ago
- Repo Filled With Follow Along Guides☆80Jun 8, 2022Updated 3 years ago
- Ini adalah kumpulan webshell atau backdoor yang lengkap☆18Aug 18, 2024Updated last year
- Personal scripts☆15Sep 11, 2024Updated last year
- ☆16Jun 28, 2025Updated 8 months ago
- ☆28Nov 18, 2021Updated 4 years ago
- Scripts for importing threat feeds and CTI articles, blogs, and reports into MISP.☆18Jun 16, 2025Updated 9 months ago
- example integrate keycloak sso with php and javascript☆39Feb 19, 2020Updated 6 years ago
- Automate your C2 creation with Azure Frontdoor and randomly generated options☆15Sep 20, 2024Updated last year
- Placeholder for my detection repo and misc detection engineering content☆42Oct 20, 2023Updated 2 years ago
- Root module for creating Tier Model / Delegation Model on Active Directory☆20Aug 28, 2025Updated 6 months ago
- A Security Operations playbook to assist blue teamers from day-to-day tasks to Digital Forensics and Incident Response (DFIR) activities.☆22Updated this week
- A commandline tool that wraps the Archerysec REST API for controlling Archery and executing quick, targeted scans.☆11May 30, 2024Updated last year
- ☆13Aug 15, 2020Updated 5 years ago
- Line notify gateway for Prometheus.☆11Dec 8, 2022Updated 3 years ago
- named routes support for Caddy v2☆15May 26, 2021Updated 4 years ago
- PAM module for Auth0☆12Apr 20, 2020Updated 5 years ago
- AircrackNG commands guide☆21Jun 24, 2018Updated 7 years ago
- VolchockC2 is a custom-built Command & Control (C2) framework, currently under active development. Designed for red team operations and a…☆33Jul 31, 2025Updated 7 months ago
- CoreUI based Keycloak login theme☆23Aug 20, 2023Updated 2 years ago
- A web application based on Python framework Django , that brings together farmers and retailers on common platform for commodity bidding.☆10Oct 21, 2019Updated 6 years ago
- Offensive Security Scripts (OSS) - Repository of random scripts I've written for offensive purposes.☆12Feb 21, 2025Updated last year
- Advanced Wazuh Rules for more accurate threat detection. Feel free to implement within your own Wazuh environment, contribute, or fork!☆1,254Mar 11, 2026Updated last week
- Automate rule management for AWS Network Firewall☆17Updated this week
- Cross Site Scripting ( XSS ) Vulnerability Payload List☆23Feb 23, 2021Updated 5 years ago
- demo for pipeline as code☆12Nov 20, 2024Updated last year
- ☆23Jul 27, 2023Updated 2 years ago
- System Administrator Appreciation Day☆11Aug 1, 2025Updated 7 months ago
- ☆13Sep 30, 2022Updated 3 years ago
- Introducing the most powerful tool to create, share and practice Networking Lab with multi-vendors.☆62Jul 24, 2023Updated 2 years ago
- A solution designed to simplify AWS Identity Center (SSO) management using simple JSON/YAML inputs.☆16Jul 31, 2025Updated 7 months ago
- Use Kubecost API as a Grafana JSON data source.☆10Jan 24, 2025Updated last year
- Linux Troubleshooting Scenarios based question with solutions☆50Aug 4, 2022Updated 3 years ago
- ☆12Nov 15, 2018Updated 7 years ago
- This is a Restaurant Management Project developed using Java and JavaFX and Scene Builder, where Admin can manage meals and drinks prices…☆19May 2, 2019Updated 6 years ago
- Cloud-IAM own Keycloak theme☆26Oct 7, 2024Updated last year
- ☆17Mar 10, 2025Updated last year
- It is a Web Application for the new way of trading agricultural products by cut-loosing the middle interfaces between farmer and the cons…☆21Dec 7, 2019Updated 6 years ago
- Set of security tools that can be integrated in Jenkins pipelines.☆18Sep 19, 2019Updated 6 years ago