StamusNetworks / stamusctlLinks
Command line tool designed to set up, start and maintain Clear NDR installation.
☆31Updated this week
Alternatives and similar repositories for stamusctl
Users that are interested in stamusctl are comparing it to the libraries listed below
Sorting:
- Docker Image packaging for OpenCVE☆49Updated last year
- Docker container for the gophish phishing framework.☆52Updated last month
- Repo to hold wazuh manager mcp server☆74Updated 4 months ago
- A web application that allows the users to check whether their SPF, DMARC and DKIM configuration is set up correctly.☆195Updated last week
- Hunt Smarter, Hunt Harder☆135Updated last month
- Wazuh integration TheHive☆41Updated 2 years ago
- Windows Event Log Auditor☆83Updated this week
- Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports f…☆142Updated 3 years ago
- Source code and examples for Antignis☆44Updated 3 years ago
- Our collection of Wazuh detection rules for our Offense Lab☆18Updated 3 years ago
- A Ruleset to enhance detection capabilities of Ossec using Sysmon☆95Updated 3 years ago
- Useful scripts for those administering Wazuh☆91Updated last month
- Sysmon and wazuh integration with Sigma sysmon rules [updated]☆71Updated 4 years ago
- OpenCTI–Wazuh connector looking for indicators in Wazuh and creating sightings☆22Updated last year
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆56Updated 3 months ago
- BlueBox Malware analysis Box and Cyber threat intelligence.☆47Updated 3 years ago
- HookPhish is a Python script designed to aid in the detection of phishing websites☆40Updated 2 years ago
- Comprehensive adversary emulation tool for security testing on Google Cloud Platform (GCP) environments.☆14Updated last year
- Automation tool for Windows Deception Host Burn-In☆86Updated last year
- Explore the GOAD Active Directory lab in 5 minutes with Adalanche☆42Updated last year
- Enhance your malware detection with WAF + YARA (WAFARAY)☆108Updated 3 years ago
- ☆61Updated this week
- Look into EDR events from network☆25Updated 2 months ago
- Signature based honeypot detector tool written in Golang☆108Updated 10 months ago
- Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Group☆86Updated last year
- Open Source External Attack Surface Management☆49Updated last year
- ☆80Updated 2 years ago
- OpenAEV Docker deployment helpers☆28Updated last week
- ☆22Updated 3 years ago
- PowerShell scripts for fast Windows Event Collector configuration with Palantir toolset☆22Updated 3 years ago