StamusNetworks / stamusctlLinks
Command line tool designed to set up, start and maintain Clear NDR installation.
☆31Updated 3 months ago
Alternatives and similar repositories for stamusctl
Users that are interested in stamusctl are comparing it to the libraries listed below
Sorting:
- Repo to hold wazuh manager mcp server☆68Updated 2 months ago
- Wazuh integration TheHive☆40Updated 2 years ago
- Interactive simulation of a fictional ransomware group's dashboard☆12Updated last year
- A web application that allows the users to check whether their SPF, DMARC and DKIM configuration is set up correctly.☆182Updated last week
- HookPhish is a Python script designed to aid in the detection of phishing websites☆40Updated 2 years ago
- Source code and examples for Antignis☆44Updated 3 years ago
- OpenCTI–Wazuh connector looking for indicators in Wazuh and creating sightings☆22Updated last year
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆54Updated last month
- A Ruleset to enhance detection capabilities of Ossec using Sysmon☆94Updated 3 years ago
- Useful scripts for those administering Wazuh☆88Updated last week
- Sysmon and wazuh integration with Sigma sysmon rules [updated]☆70Updated 4 years ago
- Docker Image packaging for OpenCVE☆48Updated last year
- Comprehensive adversary emulation tool for security testing on Google Cloud Platform (GCP) environments.☆14Updated last year
- Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports f…☆142Updated 2 years ago
- Signature based honeypot detector tool written in Golang☆107Updated 8 months ago
- Automation tool for Windows Deception Host Burn-In☆86Updated last year
- Modern honeypot supporting multiple services, realistic website cloning, and AI-powered features☆152Updated last week
- Provides an advanced baseline to implement a secure Windows auditing strategy on Windows OS.☆57Updated 6 months ago
- Docker container for the gophish phishing framework.☆52Updated 2 months ago
- Collection of tool you need to have in your Endpoint Detection and Response arsenal☆110Updated last year
- Repo Filled With Follow Along Guides☆80Updated 3 years ago
- Convert Sigma rules to SIEM queries, directly in your browser.☆96Updated this week
- Roota is a public-domain language of threat detection and response that combines native queries from a SIEM, EDR, XDR, or Data Lake with …☆132Updated last year
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆81Updated 7 months ago
- OpenAEV Docker deployment helpers☆26Updated last week
- Look into EDR events from network☆25Updated 3 weeks ago
- A tool to assess the compliance of a VMware vSphere environment against the CIS Benchmark.☆55Updated 3 years ago
- yara detection rules for hunting with the threathunting-keywords project☆155Updated 7 months ago
- PowerShell scripts for fast Windows Event Collector configuration with Palantir toolset☆22Updated 3 years ago
- Our collection of Wazuh detection rules for our Offense Lab☆17Updated 3 years ago