StamusNetworks / stamusctlLinks
Command line tool designed to set up, start and maintain Clear NDR installation.
☆31Updated last week
Alternatives and similar repositories for stamusctl
Users that are interested in stamusctl are comparing it to the libraries listed below
Sorting:
- Repo to hold wazuh manager mcp server☆69Updated 3 months ago
- Wazuh integration TheHive☆41Updated 2 years ago
- HookPhish is a Python script designed to aid in the detection of phishing websites☆40Updated 2 years ago
- Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports f…☆142Updated 2 years ago
- OpenCTI–Wazuh connector looking for indicators in Wazuh and creating sightings☆22Updated last year
- A web application that allows the users to check whether their SPF, DMARC and DKIM configuration is set up correctly.☆187Updated last week
- Automation tool for Windows Deception Host Burn-In☆86Updated last year
- Signature based honeypot detector tool written in Golang☆107Updated 9 months ago
- Interactive simulation of a fictional ransomware group's dashboard☆12Updated last year
- Integrate your Wazuh-Manager or Graylog with the SOCFortress Threat Intel Service☆32Updated last year
- Look into EDR events from network☆25Updated last month
- Analyze pcaps with Zeek and a Grafana Dashboard☆188Updated last year
- Sysmon and wazuh integration with Sigma sysmon rules [updated]☆71Updated 4 years ago
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆54Updated 2 months ago
- ☆61Updated this week
- Collection of tool you need to have in your Endpoint Detection and Response arsenal☆111Updated last year
- Docker container for the gophish phishing framework.☆52Updated this week
- Modern honeypot supporting multiple services, realistic website cloning, and AI-powered features☆154Updated last month
- ☆20Updated 4 years ago
- SOARCA - The Open Source CACAO-based Security Orchestrator!☆100Updated 2 weeks ago
- yara detection rules for hunting with the threathunting-keywords project☆156Updated 7 months ago
- Newly registered Domain Monitoring to detect phishing and brand impersonation with subdomain enumeration and source code scraping☆63Updated 2 months ago
- Open Source External Attack Surface Management☆49Updated last year
- OpenAEV Docker deployment helpers☆26Updated last week
- Useful scripts for those administering Wazuh☆90Updated 3 weeks ago
- BlueBox Malware analysis Box and Cyber threat intelligence.☆45Updated 3 years ago
- Our collection of Wazuh detection rules for our Offense Lab☆17Updated 3 years ago
- ☆22Updated 3 years ago
- A Ruleset to enhance detection capabilities of Ossec using Sysmon☆94Updated 3 years ago
- Convert Sigma rules to SIEM queries, directly in your browser.☆107Updated 2 weeks ago