PacktPublishing / Security-Monitoring-using-Wazuh
Security Monitoring using Wazuh, published by Packt
☆14Updated 9 months ago
Alternatives and similar repositories for Security-Monitoring-using-Wazuh:
Users that are interested in Security-Monitoring-using-Wazuh are comparing it to the libraries listed below
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆18Updated last year
- Lua plugin to extract data from Wireshark and convert it into MISP format☆47Updated last year
- A MITRE ATT&CK Lookup Tool☆45Updated 8 months ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆62Updated 2 years ago
- Security Orchestration, Automation and Response for Security Analysts, published by Packt☆18Updated last year
- ☆15Updated 3 years ago
- Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.☆32Updated last month
- This script provides a Python library with methods to authenticate to various sources of threat intelligence and query IPs for the latest…☆18Updated 2 years ago
- Explore the GOAD Active Directory lab in 5 minutes with Adalanche☆36Updated last week
- Virtual machines that are set up with a variety of known vulnerabilities.☆12Updated 2 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆25Updated last year
- Sharing Threat Hunting runbooks☆24Updated 5 years ago
- US Government controls formatted for usability☆17Updated 3 years ago
- ☆18Updated 3 years ago
- Repo for Automations and other solutions for Elastic SIEM/Security.☆18Updated 3 years ago
- DNS Dashboard for hunting and identifying beaconing☆14Updated 4 years ago
- Threat Simulator for Enterprise Networks☆14Updated 2 years ago
- ☆17Updated 2 months ago
- Example Suricata rules implementing some of my detection tactics☆20Updated 2 years ago
- ☆21Updated 3 years ago
- Specific guidance and configuration scripts based on Microsoft-recommended security configuration baselines for Windows.☆11Updated 4 years ago
- SANS has a massive list of posters available for quick reference to aid you in your security learning.☆12Updated 3 years ago
- Open Threat-Informed Detection Engineering☆28Updated last week
- This project can be used to create AMIs based on Kali Linux, a penetration testing distribution.☆18Updated this week
- Practical Information Sharing between Law Enforcement and CSIRT communities using MISP☆31Updated last year
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Updated 3 years ago
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆51Updated 2 years ago
- ☆13Updated last year