PacktPublishing / Security-Monitoring-using-WazuhLinks
Security Monitoring using Wazuh, published by Packt
☆29Updated last year
Alternatives and similar repositories for Security-Monitoring-using-Wazuh
Users that are interested in Security-Monitoring-using-Wazuh are comparing it to the libraries listed below
Sorting:
- Automating Security Detection Engineering, published by Packt☆63Updated last year
- MISP Playbooks☆215Updated last week
- Threat Hunting with Elastic Stack, Published by Packt☆39Updated 2 years ago
- ☆218Updated last year
- ☆185Updated last year
- VirtualGHOST Detection Tool☆94Updated last year
- Integrate your Wazuh-Manager or Graylog with the SOCFortress Threat Intel Service☆30Updated last year
- An automated Breach and Attack Simulation lab with terraform. Built for IaC stability, consistency, and speed.☆198Updated last year
- Online resources related to Detection Engineering. Detection rules, detection logic, attack samples, detection tests and emulation tools…☆120Updated last month
- Roota is a public-domain language of threat detection and response that combines native queries from a SIEM, EDR, XDR, or Data Lake with …☆131Updated last year
- A starter pack of resources to help you get started in Detection Engineering.☆174Updated last month
- Incident Response with Threat Intelligence, published by Packt☆55Updated last year
- Security Scripts and Sources for daily usage.☆65Updated 3 weeks ago
- ☆94Updated 2 months ago
- Repo to hold wazuh manager mcp server☆59Updated last month
- ☆116Updated 4 months ago
- Repository for Cortex XDR and Cortex XSIAM XQL queries and more!☆36Updated last year
- This project is a Terraform-based implementation for deploying a Security Operations Center (SOC) using Kali Linux in AWS. It provides an…☆118Updated 11 months ago
- ThreatSeeker: Threat Hunting via Windows Event Logs☆122Updated 2 years ago
- Tools for simulating threats☆193Updated last year
- Playbook-NG is a stateless web-based application used to match incident findings with countermeasures for adversary containment and evict…☆151Updated 3 weeks ago
- A list of Splunk queries that I've collected and used over time.☆86Updated 4 years ago
- Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science☆145Updated last week
- practical toolkit for cybersecurity and IT professionals. It features a detailed Linux cheatsheet for incident response☆402Updated last year
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆159Updated 6 months ago
- ☆52Updated 2 years ago
- Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Group☆86Updated 9 months ago
- Advanced Bash script designed for conducting digital forensics on Linux systems☆144Updated last year
- Mapping of open-source detection rules and atomic tests.☆177Updated 9 months ago
- A library of Incident Response notebooks using Jupyter. We will show how you can leverage pre-defined notebook files to guide your incide…☆149Updated last year