PacktPublishing / Security-Monitoring-using-WazuhLinks
Security Monitoring using Wazuh, published by Packt
☆35Updated last year
Alternatives and similar repositories for Security-Monitoring-using-Wazuh
Users that are interested in Security-Monitoring-using-Wazuh are comparing it to the libraries listed below
Sorting:
- MISP Playbooks☆222Updated 2 months ago
- ☆219Updated last year
- ☆95Updated last month
- ☆190Updated last year
- Threat Hunting with Elastic Stack, Published by Packt☆39Updated 2 years ago
- Automating Security Detection Engineering, published by Packt☆65Updated last year
- A starter pack of resources to help you get started in Detection Engineering.☆177Updated 4 months ago
- An automated Adversary Emulation lab with terraform and MCP server. Build Caldera techniques and operations assisted with LLMs. Built f…☆204Updated last month
- Online resources related to Detection Engineering. Detection rules, detection logic, attack samples, detection tests and emulation tools…☆136Updated last month
- Integrate your Wazuh-Manager or Graylog with the SOCFortress Threat Intel Service☆31Updated last year
- Security Scripts and Sources for daily usage.☆69Updated last month
- A 30-day hands-on SOC Analyst project simulating real-world cyber attacks using ELK Stack, Mythic C2, osTicket & Elastic Defend. Covers t…☆39Updated 6 months ago
- Cybether - A modern, open-source Cybersecurity Governance, Risk, and Compliance (GRC) dashboard☆84Updated 2 weeks ago
- Tools for simulating threats☆199Updated 2 years ago
- ☆54Updated 2 years ago
- A self assessment tool to help understand your level in the SANS Vulnerability Management Maturity Model (VMMM).☆50Updated last month
- VirtualGHOST Detection Tool☆101Updated 3 weeks ago
- ☆64Updated 4 years ago
- A list of Splunk queries that I've collected and used over time.☆89Updated 5 years ago
- Repository for Cortex XDR and Cortex XSIAM XQL queries and more!☆38Updated last year
- MITRE Caldera™ for OT Plugins & Capabilities☆230Updated 2 weeks ago
- A library of Incident Response notebooks using Jupyter. We will show how you can leverage pre-defined notebook files to guide your incide…☆152Updated 2 years ago
- Incident Response with Threat Intelligence, published by Packt☆56Updated last year
- Mapping of open-source detection rules and atomic tests.☆193Updated 11 months ago
- My eBook with tips on how to get started in industrial (ICS/OT) cyber security.☆72Updated 2 years ago
- Roota is a public-domain language of threat detection and response that combines native queries from a SIEM, EDR, XDR, or Data Lake with …☆132Updated last year
- This project is a Terraform-based implementation for deploying a Security Operations Center (SOC) using Kali Linux in AWS. It provides an…☆117Updated last year
- Awesome Incident Response☆283Updated 3 months ago
- practical toolkit for cybersecurity and IT professionals. It features a detailed Linux cheatsheet for incident response☆402Updated last year
- Incident Response documents and tooling☆111Updated this week