PacktPublishing / Security-Monitoring-using-WazuhLinks
Security Monitoring using Wazuh, published by Packt
☆23Updated last year
Alternatives and similar repositories for Security-Monitoring-using-Wazuh
Users that are interested in Security-Monitoring-using-Wazuh are comparing it to the libraries listed below
Sorting:
- Deployment scripts and a simple reports for CIS benchmarks☆26Updated 3 weeks ago
- Explore the GOAD Active Directory lab in 5 minutes with Adalanche☆38Updated 5 months ago
- Threat Hunting with Elastic Stack, Published by Packt☆39Updated 2 years ago
- Online resources related to Detection Engineering. Detection rules, detection logic, attack samples, detection tests and emulation tools…☆99Updated 3 weeks ago
- A small security playground implementation of GHOSTS User Simulation framework with an Active Directory deployment and Elastic.☆18Updated 11 months ago
- Automating Security Detection Engineering, published by Packt☆57Updated 8 months ago
- Incident Response with Threat Intelligence, published by Packt☆52Updated last year
- Security Scripts and Sources for daily usage.☆61Updated 2 weeks ago
- Security Orchestration, Automation and Response for Security Analysts, published by Packt☆20Updated 5 months ago
- Threat Simulator for Enterprise Networks☆14Updated 3 years ago
- Jupyter Univere is a search engine for all infosec jupyter notebooks☆26Updated 3 months ago
- Repository for Cortex XDR and Cortex XSIAM XQL queries and more!☆30Updated last year
- 🚀 IRIS-SOAR: Modular SOAR (Security Orchestration, Automation, and Response) implementation in Python. Designed to complement DFIR-IRIS …☆10Updated last year
- Powershell Based tool for gathering information related to O365 intrusions and potential Breaches☆14Updated 5 months ago
- Domain Response is a tool that is designed to help you automate the investigation for a domain. This tool is specificly designed to autom…☆48Updated last year
- Python3 script to quickly get various information from a domain controller through his LDAP service.☆11Updated 3 years ago
- A collection of awesome tools, software, libraries, learning tutorials & videos, frameworks, best practices and technical resources abou…☆52Updated 2 years ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆70Updated 2 years ago
- This script enhances endpoint logging telemetry for the purpose of advanced malware threat detection or for building detections or malwar…☆31Updated 2 months ago
- VirtualGHOST Detection Tool☆91Updated last year
- Provides an advanced baseline to implement a secure Windows auditing strategy on Windows OS.☆54Updated 2 weeks ago
- A list of resources to build a information security team.☆13Updated 4 years ago
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆76Updated 2 months ago
- ☆19Updated 3 years ago
- Comprehensive adversary emulation tool for security testing on Google Cloud Platform (GCP) environments.☆14Updated last year
- The Eventlog Compendium is the go-to resource for understanding Windows Event Logs.☆45Updated 2 months ago
- God Mode Detection Rules☆134Updated 10 months ago
- Azure Activity Log Axe is a continually developing tool that simplifies the transactional log format provided by Microsoft. The tool leve…☆28Updated 9 months ago
- CrowdStrike's Open Source Policy & Contribution Guide☆40Updated 2 months ago
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆96Updated 7 months ago