Truvis / Suricata_Threat-Hunting-Rules
Collection of Suricata rule sets that I use modified to my environments.
☆38Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for Suricata_Threat-Hunting-Rules
- Threat Detection & Anomaly Detection rules for popular open-source components☆50Updated 2 years ago
- ☆46Updated 2 years ago
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆35Updated 2 years ago
- ☆47Updated this week
- ☆41Updated last year
- Collection of Dashboards for Threat Hunting and more!☆59Updated 4 years ago
- Suricata rules for network anomaly detection☆154Updated 2 months ago
- S2AN - Mapper of Sigma/Suricata Rules/Signatures ➡️ MITRE ATT&CK Navigator☆84Updated last year
- Repo of python/bash scripts for identifying IoC's in threat feed and other online tools☆26Updated 4 years ago
- Library of threat hunts to get any user started!☆40Updated 4 years ago
- The Project can be used to integrate QRadar with MISP Threat Sharing Platform☆39Updated 2 years ago
- ☆18Updated 3 years ago
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆60Updated 7 months ago
- Sysmon and wazuh integration with Sigma sysmon rules [updated]☆61Updated 3 years ago
- Run Velociraptor on Security Onion☆34Updated 2 years ago
- A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the…☆61Updated 2 years ago
- Parse wazuh[HIDS] alerts into ECS mapping using Filebeat☆27Updated 4 years ago
- A Ruleset to enhance detection capabilities of Ossec using Sysmon☆87Updated 2 years ago
- Quickly generate suricata rules for IOCs☆28Updated 3 years ago
- Convert Sigma rules to Wazuh rules☆58Updated 7 months ago
- Repository for SPEED SIEM Use Case Framework☆52Updated 4 years ago
- Suricata rule and intel index☆29Updated last month
- A Sigma to Wazuh / OSSEC converter including a generated Windows Sysmon ruleset☆33Updated 4 years ago
- Suricata Language Server is an implementation of the Language Server Protocol for Suricata signatures. It adds syntax check, hints and au…☆64Updated last week
- Reference sheet for Threat Hunting Professional Course☆25Updated 5 years ago
- Cyber Threat Intelligence Data, Indicators, and Analysis☆74Updated last month
- Sightings Ecosystem gives cyber defenders visibility into what adversaries actually do in the wild. With your help, we are tracking MITRE…☆34Updated 7 months ago
- zeek-scripts☆41Updated 5 years ago
- Import specific data sources into the Sigma generic and open signature format.☆77Updated 2 years ago