bayusky / wazuh-custom-rules-and-decoders
In this projects are custom-decoders and custom-rules for Wazuh by me. Feel free to use it, you can redistribute it and/or modify it under the terms of GPLv2. Cybersecurity is hard, so let's work together.
☆30Updated last week
Alternatives and similar repositories for wazuh-custom-rules-and-decoders:
Users that are interested in wazuh-custom-rules-and-decoders are comparing it to the libraries listed below
- ☆210Updated 11 months ago
- ☆34Updated last year
- Configurations to implement Wazuh☆11Updated 2 years ago
- This repository will describe the details surrounding the SIEM (wazuh) mini project, which will cover all aspects of topology design, dep…☆24Updated 2 years ago
- My-Course-Materials☆33Updated last year
- Advanced Wazuh Rules for more accurate threat detection. Feel free to implement within your own Wazuh environment, contribute, or fork!☆12Updated 2 years ago
- Cyber Security Awareness Framework (CSAF)☆98Updated last month
- T-Guard Repository☆13Updated last year
- The application consists of several vulnerable web applications that are integrated with Wazuh.☆17Updated 2 years ago
- Integrate your Wazuh-Manager or Graylog with the SOCFortress Threat Intel Service☆29Updated 7 months ago
- SOAR Automation with Shuffle, Wazuh & TheHive | This project integrates Shuffle SOAR, Wazuh SIEM, and TheHive to automate security incide…☆98Updated 2 months ago
- ☆21Updated 8 months ago
- A powerful home-lab focused on setting up Splunk SIEM and real-world use cases. If you’re interested to become SOC Analyst(Tier 1/2) , th…☆52Updated last year
- A second brain used to store knowledge acquired through various academic pursuits, certifications, and technical projects.☆26Updated last month
- Deploy Vulnerable Lab to Learn Pentest using Bash Script☆10Updated 2 years ago
- ☆31Updated 3 years ago
- Set of Python programming challenge for cyber security (offensive / defensive)☆50Updated 2 years ago
- A collection of awesome software, libraries, learning tutorials, documents and books, technical resources and cool stuff about Blue Team …☆40Updated 2 years ago
- Repo Filled With Follow Along Guides☆75Updated 2 years ago
- All credits to Matt Walker (Author of "CEH Certified Ethical Hacker All-in-One Exam Guide" ISBN 1264269943)☆13Updated 3 years ago
- SOCFortress CoPilot☆275Updated this week
- Suricata rules that can detect a wide range of threats, including malware, exploits, and other malicious activity especially web applicat…☆45Updated last year
- Self-deployed Straight-forward hacking lab machine which designed for new comer who want to learn Penetration Testing field that running …☆217Updated 7 months ago
- Splunk add-on related to the PurpleLab tool☆39Updated last year
- Useful scripts for those administering Wazuh☆83Updated 3 months ago
- ☆175Updated last year
- ☆13Updated last year
- PHP Shell untuk remote shell Web Server, upload dan sebagainya☆32Updated 2 years ago
- SIEM Cheat Sheet☆73Updated last year
- ☆27Updated last year