StamusNetworks / stamusctlLinks
Command line tool designed to set up, start and maintain Clear NDR installation.
☆32Updated last month
Alternatives and similar repositories for stamusctl
Users that are interested in stamusctl are comparing it to the libraries listed below
Sorting:
- Repo to hold wazuh manager mcp server☆71Updated 4 months ago
- A web application that allows the users to check whether their SPF, DMARC and DKIM configuration is set up correctly.☆194Updated last week
- Docker Image packaging for OpenCVE☆48Updated last year
- OpenCTI–Wazuh connector looking for indicators in Wazuh and creating sightings☆22Updated last year
- Open Source External Attack Surface Management☆49Updated last year
- Comprehensive adversary emulation tool for security testing on Google Cloud Platform (GCP) environments.☆14Updated last year
- HookPhish is a Python script designed to aid in the detection of phishing websites☆40Updated 2 years ago
- Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports f…☆142Updated 3 years ago
- Hunt Smarter, Hunt Harder☆99Updated 2 weeks ago
- ☆80Updated 2 years ago
- Signature based honeypot detector tool written in Golang☆107Updated 10 months ago
- Interactive simulation of a fictional ransomware group's dashboard☆12Updated last year
- Wazuh integration TheHive☆41Updated 2 years ago
- Sysmon and wazuh integration with Sigma sysmon rules [updated]☆71Updated 4 years ago
- Collection of tool you need to have in your Endpoint Detection and Response arsenal☆111Updated last year
- Newly registered Domain Monitoring to detect phishing and brand impersonation with subdomain enumeration and source code scraping☆63Updated 3 months ago
- SECMON is a web-based tool for the automation of infosec watching and vulnerability management with a web interface.☆261Updated 3 years ago
- A Ruleset to enhance detection capabilities of Ossec using Sysmon☆94Updated 3 years ago
- Useful scripts for those administering Wazuh☆91Updated 3 weeks ago
- Our collection of Wazuh detection rules for our Offense Lab☆18Updated 3 years ago
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆55Updated 3 months ago
- Source code and examples for Antignis☆44Updated 3 years ago
- Automation tool for Windows Deception Host Burn-In☆86Updated last year
- Docker container for the gophish phishing framework.☆52Updated 2 weeks ago
- ☆56Updated last year
- nmap scripts (nse files) to identify vulnerabilities☆29Updated 2 months ago
- Modern honeypot supporting multiple services, realistic website cloning, and AI-powered features☆157Updated last month
- yara detection rules for hunting with the threathunting-keywords project☆158Updated 8 months ago
- Look into EDR events from network☆25Updated 2 months ago
- ☆17Updated last year