PacktPublishing / Security-Monitoring-using-WazuhLinks
Security Monitoring using Wazuh, published by Packt
☆36Updated last year
Alternatives and similar repositories for Security-Monitoring-using-Wazuh
Users that are interested in Security-Monitoring-using-Wazuh are comparing it to the libraries listed below
Sorting:
- MISP Playbooks☆222Updated 3 months ago
- Automating Security Detection Engineering, published by Packt☆65Updated last year
- Incident Response with Threat Intelligence, published by Packt☆56Updated last year
- Cybether - A modern, open-source Cybersecurity Governance, Risk, and Compliance (GRC) dashboard☆85Updated last month
- Online resources related to Detection Engineering. Detection rules, detection logic, attack samples, detection tests and emulation tools…☆136Updated last month
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆106Updated 3 years ago
- SIEM Cheat Sheet☆77Updated 2 years ago
- ☆192Updated last year
- An automated Adversary Emulation lab with terraform and MCP server. Build Caldera techniques and operations assisted with LLMs. Built f…☆204Updated last month
- A self assessment tool to help understand your level in the SANS Vulnerability Management Maturity Model (VMMM).☆51Updated last month
- A starter pack of resources to help you get started in Detection Engineering.☆180Updated this week
- Repo to hold wazuh manager mcp server☆71Updated 3 months ago
- Advanced Bash script designed for conducting digital forensics on Linux systems☆144Updated last year
- Playbook-NG is a stateless web-based application used to match incident findings with countermeasures for adversary containment and evict…☆156Updated last month
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆55Updated 2 months ago
- Roota is a public-domain language of threat detection and response that combines native queries from a SIEM, EDR, XDR, or Data Lake with …☆132Updated last year
- ThreatSeeker: Threat Hunting via Windows Event Logs☆123Updated 2 years ago
- Threat Hunting with Elastic Stack, Published by Packt☆39Updated 3 years ago
- Mapping of open-source detection rules and atomic tests.☆193Updated last year
- ☆35Updated last year
- Blue Team detection lab created with Terraform and Ansible in Azure.☆175Updated last year
- VirtualGHOST Detection Tool☆101Updated last month
- Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Group☆86Updated last year
- A library of Incident Response notebooks using Jupyter. We will show how you can leverage pre-defined notebook files to guide your incide…☆151Updated 2 years ago
- This project is a Terraform-based implementation for deploying a Security Operations Center (SOC) using Kali Linux in AWS. It provides an…☆117Updated last year
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆162Updated 9 months ago
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆82Updated 9 months ago
- ☆74Updated last week
- ☆96Updated 2 weeks ago
- ☆119Updated 7 months ago