PacktPublishing / Security-Monitoring-using-Wazuh
Security Monitoring using Wazuh, published by Packt
☆20Updated last year
Alternatives and similar repositories for Security-Monitoring-using-Wazuh:
Users that are interested in Security-Monitoring-using-Wazuh are comparing it to the libraries listed below
- Security Orchestration, Automation and Response for Security Analysts, published by Packt☆20Updated 3 months ago
- Explore the GOAD Active Directory lab in 5 minutes with Adalanche☆36Updated 3 months ago
- ☆19Updated 3 years ago
- A collection of awesome tools, software, libraries, learning tutorials & videos, frameworks, best practices and technical resources abou…☆52Updated 2 years ago
- CrowdStrike's Open Source Policy & Contribution Guide☆39Updated 3 weeks ago
- Incident Response with Threat Intelligence, published by Packt☆52Updated last year
- Threat Hunting with Elastic Stack, Published by Packt☆39Updated 2 years ago
- Jupyter Univere is a search engine for all infosec jupyter notebooks☆26Updated last month
- Threat Simulator for Enterprise Networks☆14Updated 2 years ago
- Welcome to the Cloud Security Toolkit repository, your all-in-one destination for cutting-edge cloud security resources! Whether you're d…☆22Updated last week
- Repository for Cortex XDR and Cortex XSIAM XQL queries and more!☆27Updated 10 months ago
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆19Updated last year
- SANS has a massive list of posters available for quick reference to aid you in your security learning.☆19Updated 3 years ago
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆55Updated 3 years ago
- ☆53Updated last week
- Automating Security Detection Engineering, published by Packt☆54Updated 6 months ago
- Automation tool for Windows Deception Host Burn-In☆85Updated 4 months ago
- Online resources related to Detection Engineering. Detection rules, detection logic, attack samples, detection tests and emulation tools…☆87Updated this week
- Deployment scripts and a simple reports for CIS benchmarks☆22Updated 2 months ago
- Provides an advanced baseline to implement a secure Windows auditing strategy on Windows OS.☆53Updated 3 months ago
- Web based S1 query navigator for one-click threat hunting☆18Updated 4 years ago
- (Unofficial) Wazuh integration to send alerts to IRIS.☆17Updated 3 months ago
- Integrate your Wazuh-Manager or Graylog with the SOCFortress Threat Intel Service☆29Updated 6 months ago
- Repo for Automations and other solutions for Elastic SIEM/Security.☆18Updated 3 years ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆40Updated 11 months ago
- BlueBox Malware analysis Box and Cyber threat intelligence.☆40Updated 3 years ago
- ☆16Updated 3 years ago
- A curated list of awesome threat detection and hunting resources☆16Updated 6 years ago
- Purple Team Strategies, Published by Packt☆12Updated 2 years ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆70Updated last year