bayusky / wazuh-custom-rules-and-decodersLinks
In this projects are custom-decoders and custom-rules for Wazuh by me. Feel free to use it, you can redistribute it and/or modify it under the terms of GPLv2. Cybersecurity is hard, so let's work together.
☆35Updated this week
Alternatives and similar repositories for wazuh-custom-rules-and-decoders
Users that are interested in wazuh-custom-rules-and-decoders are comparing it to the libraries listed below
Sorting:
- ☆12Updated 2 months ago
- My-Course-Materials☆33Updated last year
- This repository will describe the details surrounding the SIEM (wazuh) mini project, which will cover all aspects of topology design, dep…☆26Updated 2 years ago
- ☆213Updated last year
- T-Guard Repository☆16Updated last year
- MCP Server for Wazuh SIEM☆71Updated this week
- The application consists of several vulnerable web applications that are integrated with Wazuh.☆18Updated 2 years ago
- SOAR Automation with Shuffle, Wazuh & TheHive | This project integrates Shuffle SOAR, Wazuh SIEM, and TheHive to automate security incide…☆102Updated 4 months ago
- Kumpulan command yang dijalankan setiap chapter materi pelatihan Wazuh.☆12Updated last year
- Cyber Security Awareness Framework (CSAF)☆98Updated 3 months ago
- PHP Shell untuk remote shell Web Server, upload dan sebagainya☆32Updated 2 years ago
- Splunk add-on related to the PurpleLab tool☆41Updated last year
- ☆35Updated last year
- Kumpulan Tools untuk Incident Response☆16Updated 7 months ago
- Advanced Wazuh Rules for more accurate threat detection. Feel free to implement within your own Wazuh environment, contribute, or fork!☆13Updated 2 years ago
- Integrate your Wazuh-Manager or Graylog with the SOCFortress Threat Intel Service☆29Updated 9 months ago
- A curated collection of essential tools and scripts for bug bounty hunters and cybersecurity professionals, designed to streamline your v…☆5Updated 6 months ago
- Self-deployed Straight-forward hacking lab machine which designed for new comer who want to learn Penetration Testing field that running …☆217Updated 9 months ago
- Another network monitoring app built with nodejs.☆36Updated 3 years ago
- Configurations to implement Wazuh☆11Updated 2 years ago
- Open Source SIEM Stack☆97Updated 4 months ago
- Deploy Vulnerable Lab to Learn Pentest using Bash Script☆10Updated 2 years ago
- Suricata rules that can detect a wide range of threats, including malware, exploits, and other malicious activity especially web applicat…☆46Updated last year
- Kumpulan Course Video pembalajaran tentang Cyber Security & Hacking secara GRATIS, repositori ini akan membantu kita dalam proses pembela…☆295Updated 3 years ago
- ☆28Updated last year
- Sending file through ICMP packet using PING☆17Updated 11 months ago
- Web Shell finder using grep, where it has wordlist around the world to grep inside using regex and wordlist. So Lightweight and fast!☆25Updated 4 months ago
- NGINX reverse proxy using ModSecurity WAF to protect a web application☆15Updated 5 years ago
- Server Scanner detect rootkit and backdoor☆45Updated last year
- Xcodehoster adalah program hosting yang merupakan produk dari PT. Teknologi Server Indonesia☆28Updated 7 months ago