StamusNetworks / stamusctlLinks
Command line tool designed to set up, start and maintain Clear NDR installation.
☆27Updated last week
Alternatives and similar repositories for stamusctl
Users that are interested in stamusctl are comparing it to the libraries listed below
Sorting:
- Wazuh integration TheHive☆39Updated 2 years ago
- Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports f…☆144Updated 2 years ago
- A Ruleset to enhance detection capabilities of Ossec using Sysmon☆95Updated 3 years ago
- Repo to hold wazuh manager mcp server☆56Updated last month
- Sysmon and wazuh integration with Sigma sysmon rules [updated]☆70Updated 4 years ago
- Our collection of Wazuh detection rules for our Offense Lab☆16Updated 3 years ago
- A web application that allows the users to check whether their SPF, DMARC and DKIM configuration is set up correctly.☆145Updated this week
- HookPhish is a Python script designed to aid in the detection of phishing websites☆38Updated last year
- Enterprise-ready SIEM, SOAR and Compliance powered by real-time correlation and threat intelligence.☆325Updated last week
- Docker Image packaging for OpenCVE☆47Updated 10 months ago
- Source code and examples for Antignis☆43Updated 2 years ago
- OpenCTI–Wazuh connector looking for indicators in Wazuh and creating sightings☆19Updated last year
- Docker container for the gophish phishing framework.☆52Updated 2 weeks ago
- SECMON is a web-based tool for the automation of infosec watching and vulnerability management with a web interface.☆219Updated 3 years ago
- Analyze pcaps with Zeek and a Grafana Dashboard☆183Updated last year
- A tool to assess the compliance of a VMware vSphere environment against the CIS Benchmark.☆55Updated 2 years ago
- ☆58Updated this week
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆51Updated 8 months ago
- Look into EDR events from network☆24Updated 4 months ago
- Useful scripts for those administering Wazuh☆86Updated last week
- Newly registered Domain Monitoring to detect phishing and brand impersonation with subdomain enumeration and source code scraping☆54Updated 2 months ago
- A distributed nmap / masscan scanning framework complete with scan scheduling, engine pooling, subsequent scan port diff-ing, and an API …☆176Updated 3 years ago
- Docker configurations for TheHive, Cortex and 3rd party tools☆126Updated 2 years ago
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆141Updated 7 months ago
- ☆19Updated 2 years ago
- Collection of tool you need to have in your Endpoint Detection and Response arsenal☆105Updated last year
- Repo Filled With Follow Along Guides☆79Updated 3 years ago
- Roota is a public-domain language of threat detection and response that combines native queries from a SIEM, EDR, XDR, or Data Lake with …☆128Updated last year
- Open Source External Attack Surface Management☆48Updated last year
- Signature based honeypot detector tool written in Golang☆103Updated 5 months ago