PacktPublishing / Security-Monitoring-using-Wazuh
Security Monitoring using Wazuh, published by Packt
☆16Updated 10 months ago
Alternatives and similar repositories for Security-Monitoring-using-Wazuh:
Users that are interested in Security-Monitoring-using-Wazuh are comparing it to the libraries listed below
- Threat Simulator for Enterprise Networks☆14Updated 2 years ago
- Security Orchestration, Automation and Response for Security Analysts, published by Packt☆20Updated 3 weeks ago
- Specific guidance and configuration scripts based on Microsoft-recommended security configuration baselines for Windows.☆13Updated 4 years ago
- Repository for Cortex XDR and Cortex XSIAM XQL queries and more!☆23Updated 8 months ago
- Explore the GOAD Active Directory lab in 5 minutes with Adalanche☆36Updated last month
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Updated last year
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆51Updated 2 years ago
- A curated list of awesome threat detection and hunting resources☆16Updated 6 years ago
- A repo hosting the Markua content for the EZ Tools manuals hosted on Leanpub☆65Updated last year
- SIEM USE Case Selection Methodology☆16Updated 4 years ago
- A cheat sheet that contains the most OpenSSL commands used by Dev, SysAdmin in real life.☆59Updated 4 years ago
- PowerShell 'Hero': scripts for DFIR and automation with a PowerShell menu example.☆36Updated last year
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆63Updated 2 years ago
- ☆10Updated last month
- The ultimate solution for remotely deploying Crowdstrike sensors quickly and discreetly on any other EDR platform.☆22Updated 5 months ago
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆18Updated last year
- Open Threat-Informed Detection Engineering☆37Updated last month
- ☆46Updated 3 weeks ago
- ☆72Updated 3 months ago
- This project can be used to create AMIs based on Kali Linux, a penetration testing distribution.☆19Updated this week
- Sharing Threat Hunting runbooks☆25Updated 5 years ago
- CrowdStrike's Open Source Policy & Contribution Guide☆39Updated last year
- SANS has a massive list of posters available for quick reference to aid you in your security learning.☆13Updated 3 years ago
- Simulates a compromise in a cloud and container environment☆32Updated 2 months ago
- DNS Dashboard for hunting and identifying beaconing☆14Updated 4 years ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆38Updated 9 months ago
- Automating Security Detection Engineering, published by Packt☆54Updated 4 months ago
- Incident Response Report Using GitHub-Sphinx☆19Updated 5 years ago
- A lab environment for learning about MSTICPy☆36Updated 2 years ago
- Threat Hunting with Elastic Stack, Published by Packt☆39Updated 2 years ago