StamusNetworks / stamusctlLinks
Command line tool designed to set up, start and maintain Clear NDR installation.
☆21Updated last week
Alternatives and similar repositories for stamusctl
Users that are interested in stamusctl are comparing it to the libraries listed below
Sorting:
- Interactive simulation of a fictional ransomware group's dashboard☆12Updated 8 months ago
- Source code and examples for Antignis☆43Updated 2 years ago
- Threat Simulator for Enterprise Networks☆14Updated 3 years ago
- Tools for Wazuh by Juan C. Tello☆14Updated 3 years ago
- ☆19Updated 3 years ago
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆51Updated 4 months ago
- Sysmon and wazuh integration with Sigma sysmon rules [updated]☆66Updated 3 years ago
- A tool to assess the compliance of a VMware vSphere environment against the CIS Benchmark.☆51Updated 2 years ago
- Look into EDR events from network☆23Updated last month
- Lua plugin to extract data from Wireshark and convert it into MISP format☆48Updated last year
- Script to test NetSec capabilities.☆21Updated 2 years ago
- Our collection of Wazuh detection rules for our Offense Lab☆14Updated 3 years ago
- Repo for Automations and other solutions for Elastic SIEM/Security.☆18Updated 3 years ago
- DFIR ORC PARSER PROJECT☆25Updated 3 months ago
- HookPhish is a Python script designed to aid in the detection of phishing websites☆37Updated last year
- Deployment scripts and a simple reports for CIS benchmarks☆24Updated last week
- Provides an advanced baseline to implement a secure Windows auditing strategy on Windows OS.☆54Updated last week
- Convert Sigma rules to Wazuh rules☆65Updated last year
- ☆80Updated 2 years ago
- Living off the False Positive!☆37Updated 4 months ago
- Kibana 7 Templates for Suricata IDPS Threat Hunting☆40Updated 2 years ago
- Outil de sécurité des architectures kubernetes avancées☆53Updated 6 months ago
- ☆16Updated 3 years ago
- ☆53Updated last week
- Automation tool for Windows Deception Host Burn-In☆86Updated 6 months ago
- ☆42Updated last year
- Convert Sigma rules to SIEM queries, directly in your browser.☆81Updated this week
- A web application that allows the users to check whether their SPF, DMARC and DKIM configuration is set up correctly.☆143Updated this week
- Dissect triage script for Citrix NetScaler devices☆23Updated 11 months ago
- Signature based honeypot detector tool written in Golang☆95Updated 2 months ago