PacktPublishing / Security-Monitoring-using-Wazuh
Security Monitoring using Wazuh, published by Packt
☆12Updated 7 months ago
Related projects ⓘ
Alternatives and complementary repositories for Security-Monitoring-using-Wazuh
- Automating Security Detection Engineering, published by Packt☆47Updated last month
- Incident Response with Threat Intelligence, published by Packt☆49Updated 6 months ago
- Threat Hunting with Elastic Stack, Published by Packt☆38Updated last year
- Purple Team Strategies, Published by Packt☆11Updated last year
- Security Orchestration, Automation and Response for Security Analysts, published by Packt☆17Updated last year
- Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https…☆125Updated last year
- ☆58Updated 2 years ago
- Repository for Cortex XDR and Cortex XSIAM XQL queries and more!☆22Updated 5 months ago
- A repo hosting the Markua content for the EZ Tools manuals hosted on Leanpub☆63Updated last year
- ☆70Updated 3 weeks ago
- pySigma Splunk backend☆34Updated 7 months ago
- A dataset containing Office 365 Unified Audit Logs for security research and detection☆48Updated 2 years ago
- OpenIOC rules to facilitate hunting for indicators of compromise☆38Updated 2 years ago
- This repo is where I store my Threat Hunting ideas/content☆85Updated last year
- The Threat Actor Profile Guide for CTI Analysts☆96Updated last year
- This repository contains Splunk queries to hunt some anomalies☆38Updated 2 years ago
- Microsoft Sentinel, Defender for Endpoint - KQL Detection Packs☆51Updated last year
- Domain Response is a tool that is designed to help you automate the investigation for a domain. This tool is specificly designed to autom…☆44Updated 7 months ago
- Lua plugin to extract data from Wireshark and convert it into MISP format☆47Updated last year
- ICS/OT related Wireshark profiles + adding some other (IT or OT related) Open Source Wireshark Profiles☆16Updated this week
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆49Updated 2 years ago
- Docker Crash Course: How to containerize your favorite security tools☆27Updated last year
- Industrial Cybersecurity Second Edition, published by Packt☆23Updated last year
- User Feedback Space of #MitreAssistant☆37Updated last year
- Collection of Jupyter Notebooks by @fr0gger_☆142Updated 2 months ago
- Practical Threat Detection Engineering, Published by Packt☆58Updated last year
- The ultimate solution for remotely deploying Crowdstrike sensors quickly and discreetly on any other EDR platform.☆22Updated 2 months ago
- A lab environment for learning about MSTICPy☆36Updated last year
- Explore the GOAD Active Directory lab in 5 minutes with Adalanche☆34Updated 10 months ago