PacktPublishing / Security-Monitoring-using-WazuhLinks
Security Monitoring using Wazuh, published by Packt
☆25Updated last year
Alternatives and similar repositories for Security-Monitoring-using-Wazuh
Users that are interested in Security-Monitoring-using-Wazuh are comparing it to the libraries listed below
Sorting:
- Automating Security Detection Engineering, published by Packt☆60Updated 9 months ago
- MISP Playbooks☆206Updated last month
- Threat Hunting with Elastic Stack, Published by Packt☆39Updated 2 years ago
- A starter pack of resources to help you get started in Detection Engineering.☆164Updated last month
- Incident Response with Threat Intelligence, published by Packt☆51Updated last year
- Security Scripts and Sources for daily usage.☆64Updated 2 months ago
- A list of Splunk queries that I've collected and used over time.☆85Updated 4 years ago
- Online resources related to Detection Engineering. Detection rules, detection logic, attack samples, detection tests and emulation tools…☆112Updated 3 weeks ago
- ☆215Updated last year
- The MITRE Security Automation Framework (SAF) Command Line Interface (CLI) brings together applications, techniques, libraries, and tools…☆161Updated this week
- ☆47Updated 2 years ago
- CrowdStrike's Open Source Policy & Contribution Guide☆44Updated 4 months ago
- Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Group☆86Updated 6 months ago
- Cybether - A modern, open-source Cybersecurity Governance, Risk, and Compliance (GRC) dashboard☆80Updated 5 months ago
- ☆29Updated 6 years ago
- ☆183Updated last year
- An automated Breach and Attack Simulation lab with terraform. Built for IaC stability, consistency, and speed.☆194Updated last year
- A library of Incident Response notebooks using Jupyter. We will show how you can leverage pre-defined notebook files to guide your incide…☆147Updated last year
- A self assessment tool to help understand your level in the SANS Vulnerability Management Maturity Model (VMMM).☆40Updated 5 months ago
- Tools for simulating threats☆191Updated last year
- Roota is a public-domain language of threat detection and response that combines native queries from a SIEM, EDR, XDR, or Data Lake with …☆128Updated last year
- A collection of various SIEM rules relating to malware family groups.☆67Updated last year
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆51Updated 7 months ago
- VirtualGHOST Detection Tool☆92Updated last year
- Practical Threat Detection Engineering, Published by Packt☆76Updated 2 years ago
- A powerful home-lab focused on setting up Splunk SIEM and real-world use cases. If you’re interested to become SOC Analyst(Tier 1/2) , th…☆67Updated last year
- ☆112Updated 2 months ago
- Repository for Cortex XDR and Cortex XSIAM XQL queries and more!☆32Updated last year
- SIEM Cheat Sheet☆75Updated last year
- ☆39Updated 2 years ago