PacktPublishing / Security-Monitoring-using-WazuhLinks
Security Monitoring using Wazuh, published by Packt
☆36Updated last year
Alternatives and similar repositories for Security-Monitoring-using-Wazuh
Users that are interested in Security-Monitoring-using-Wazuh are comparing it to the libraries listed below
Sorting:
- MISP Playbooks☆222Updated 3 months ago
- Online resources related to Detection Engineering. Detection rules, detection logic, attack samples, detection tests and emulation tools…☆144Updated this week
- Incident Response with Threat Intelligence, published by Packt☆57Updated last year
- Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Group☆86Updated last year
- SIEM Cheat Sheet☆80Updated 2 years ago
- ☆220Updated last year
- Cybether - A modern, open-source Cybersecurity Governance, Risk, and Compliance (GRC) dashboard☆86Updated last month
- Automating Security Detection Engineering, published by Packt☆67Updated last year
- Repo to hold wazuh manager mcp server☆74Updated 4 months ago
- Playbook-NG is a stateless web-based application used to match incident findings with countermeasures for adversary containment and evict…☆155Updated 2 months ago
- Threat Hunting with Elastic Stack, Published by Packt☆40Updated 3 years ago
- An automated Adversary Emulation lab with terraform and MCP server. Build Caldera techniques and operations assisted with LLMs. Built f…☆205Updated 2 months ago
- ThreatSeeker: Threat Hunting via Windows Event Logs☆124Updated 2 years ago
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆56Updated 3 months ago
- ☆193Updated last year
- ☆120Updated 8 months ago
- God Mode Detection Rules☆135Updated last year
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆162Updated 10 months ago
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆106Updated 3 years ago
- Security Orchestration, Automation and Response for Security Analysts, published by Packt☆22Updated last year
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆82Updated 9 months ago
- Mapping of open-source detection rules and atomic tests.☆195Updated this week
- ☆35Updated last year
- ☆54Updated 2 years ago
- Advanced Bash script designed for conducting digital forensics on Linux systems☆144Updated last year
- AI-powered cybersecurity attack flow visualization tool using MITRE ATT&CK☆197Updated 2 months ago
- ☆74Updated last week
- VirtualGHOST Detection Tool☆105Updated 2 months ago
- A collection of CVEs weaponized by ransomware operators☆129Updated 3 months ago
- ☆41Updated 2 years ago