PacktPublishing / Security-Monitoring-using-WazuhLinks
Security Monitoring using Wazuh, published by Packt
☆31Updated last year
Alternatives and similar repositories for Security-Monitoring-using-Wazuh
Users that are interested in Security-Monitoring-using-Wazuh are comparing it to the libraries listed below
Sorting:
- Threat Hunting with Elastic Stack, Published by Packt☆39Updated 2 years ago
- Repo to hold wazuh manager mcp server☆65Updated last month
- Automating Security Detection Engineering, published by Packt☆64Updated last year
- ☆52Updated 2 years ago
- Integrate your Wazuh-Manager or Graylog with the SOCFortress Threat Intel Service☆31Updated last year
- ☆187Updated last year
- ☆218Updated last year
- MISP Playbooks☆219Updated last month
- Security Scripts and Sources for daily usage.☆67Updated last month
- A self assessment tool to help understand your level in the SANS Vulnerability Management Maturity Model (VMMM).☆46Updated 8 months ago
- ☆96Updated 3 months ago
- A starter pack of resources to help you get started in Detection Engineering.☆174Updated 2 months ago
- Cybether - A modern, open-source Cybersecurity Governance, Risk, and Compliance (GRC) dashboard☆83Updated 2 months ago
- ☆63Updated 4 years ago
- An automated Breach and Attack Simulation lab with terraform. Built for IaC stability, consistency, and speed.☆200Updated this week
- A collection of awesome tools, software, libraries, learning tutorials & videos, frameworks, best practices and technical resources abou…☆58Updated 2 years ago
- Online resources related to Detection Engineering. Detection rules, detection logic, attack samples, detection tests and emulation tools…☆126Updated 2 months ago
- Incident Response with Threat Intelligence, published by Packt☆55Updated last year
- Repository for Cortex XDR and Cortex XSIAM XQL queries and more!☆36Updated last year
- ☆32Updated 3 years ago
- Playbook-NG is a stateless web-based application used to match incident findings with countermeasures for adversary containment and evict…☆152Updated 3 weeks ago
- Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Group☆86Updated 10 months ago
- Automation tool for Windows Deception Host Burn-In☆86Updated 11 months ago
- A comprehensive Windows security auditing and threat detection toolkit. Features 58 production-ready PowerShell functions organized into …☆56Updated last month
- ☆55Updated 3 weeks ago
- VirtualGHOST Detection Tool☆96Updated last year
- CrowdStrike's Open Source Policy & Contribution Guide☆45Updated last month
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆107Updated 2 years ago
- A list of Splunk queries that I've collected and used over time.☆87Updated 5 years ago
- Roota is a public-domain language of threat detection and response that combines native queries from a SIEM, EDR, XDR, or Data Lake with …☆132Updated last year