bayusky / wazuh-custom-rules-and-decoders
In this projects are custom-decoders and custom-rules for Wazuh by me. Feel free to use it, you can redistribute it and/or modify it under the terms of GPLv2. Cybersecurity is hard, so let's work together.
☆25Updated last month
Alternatives and similar repositories for wazuh-custom-rules-and-decoders:
Users that are interested in wazuh-custom-rules-and-decoders are comparing it to the libraries listed below
- My-Course-Materials☆34Updated last year
- This repository will describe the details surrounding the SIEM (wazuh) mini project, which will cover all aspects of topology design, dep…☆23Updated 2 years ago
- ☆209Updated 11 months ago
- ☆34Updated last year
- Cyber Security Awareness Framework (CSAF)☆97Updated last month
- The application consists of several vulnerable web applications that are integrated with Wazuh.☆17Updated last year
- Advanced Wazuh Rules for more accurate threat detection. Feel free to implement within your own Wazuh environment, contribute, or fork!☆12Updated 2 years ago
- Useful scripts for those administering Wazuh☆83Updated 3 months ago
- Comprehensive Toolkit for Boosting and Fostering Cybersecurity Compliance☆47Updated 5 months ago
- Deploy Vulnerable Lab to Learn Pentest using Bash Script☆10Updated last year
- SecStory (Security Story) adalah buku digital yang berisi kumpulan donasi cerita, ditulis oleh para pemangku kepentingan keamanan siber d…☆72Updated 5 years ago
- Configurations to implement Wazuh☆11Updated 2 years ago
- Integrate your Wazuh-Manager or Graylog with the SOCFortress Threat Intel Service☆29Updated 7 months ago
- PHP Shell untuk remote shell Web Server, upload dan sebagainya☆31Updated 2 years ago
- Kumpulan command yang dijalankan setiap chapter materi pelatihan Wazuh.☆11Updated last year
- An offline Phishing Email Analyzer. Enabling non-techies to analyze phishing emails automatically!☆61Updated last year
- T-Guard Repository☆13Updated 11 months ago
- Self-deployed Straight-forward hacking lab machine which designed for new comer who want to learn Penetration Testing field that running …☆215Updated 7 months ago
- This repository is a comprehensive collection of resources, documentation, apps, and add-ons related to Splunk, a powerful data analytics…☆21Updated this week
- Wazuh integration TheHive☆35Updated 2 years ago
- Ansible Playbook to install the ELK Stack☆43Updated 4 years ago
- Reference list of useful links to learn about programming, networking, hacking, cybersecurity, ctf, bounty bug write-up, and more☆97Updated 4 years ago
- A powerful home-lab focused on setting up Splunk SIEM and real-world use cases. If you’re interested to become SOC Analyst(Tier 1/2) , th…☆51Updated last year
- You can get a lifetime of FREE VPS using GitHub Codespaces with Kali Linux Docker image installed on github workspace terminal.☆79Updated 3 months ago
- NGINX reverse proxy using ModSecurity WAF to protect a web application☆15Updated 5 years ago
- Another network monitoring app built with nodejs.☆36Updated 3 years ago
- ☆12Updated 4 years ago
- Go script to guess an API key / OAuth token found during pentest. CLI version of https://github.com/daffainfo/apiguesser-web/☆44Updated 2 years ago
- ☆11Updated 3 years ago
- Suricata rules that can detect a wide range of threats, including malware, exploits, and other malicious activity especially web applicat…☆43Updated last year