bayusky / wazuh-custom-rules-and-decoders
In this projects are custom-decoders and custom-rules for Wazuh by me. Feel free to use it, you can redistribute it and/or modify it under the terms of GPLv2. Cybersecurity is hard, so let's work together.
☆12Updated last month
Related projects ⓘ
Alternatives and complementary repositories for wazuh-custom-rules-and-decoders
- Integrate your Wazuh-Manager or Graylog with the SOCFortress Threat Intel Service☆24Updated last month
- Cyber Security Awareness Framework (CSAF)☆88Updated 2 weeks ago
- SIEM Cheat Sheet☆72Updated last year
- Suricata rules that can detect a wide range of threats, including malware, exploits, and other malicious activity especially web applicat…☆39Updated 7 months ago
- ☆33Updated last year
- ☆31Updated 2 years ago
- Our collection of Wazuh detection rules for our Offense Lab☆12Updated 2 years ago
- ☆55Updated 6 months ago
- Personal scripts☆12Updated 2 months ago
- Convert Sigma rules to Wazuh rules☆58Updated 7 months ago
- ☆11Updated 9 months ago
- ThreatSeeker: Threat Hunting via Windows Event Logs☆114Updated last year
- This is the One Stop place where you can several Detection Rules which can help you to kick start your journey on SIEM, SOC work.☆36Updated 3 years ago
- ☆196Updated 6 months ago
- T-Guard Repository☆13Updated 6 months ago
- An offline Phishing Email Analyzer. Enabling non-techies to analyze phishing emails automatically!☆54Updated last year
- Wazuh integration TheHive☆33Updated last year
- This is the One Stop place where you can find almost all of your Tools of Requirements in DFIR☆71Updated 2 years ago
- Python3 script to quickly get various information from a domain controller through his LDAP service.☆11Updated 2 years ago
- A powerful home-lab focused on setting up Splunk SIEM and real-world use cases. If you’re interested to become SOC Analyst(Tier 1/2) , th…☆40Updated 7 months ago
- ☆24Updated last year
- A collection of sources of documentation and best practices to build and run a SOC☆33Updated last year
- Useful scripts for those administering Wazuh☆72Updated 3 months ago
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆75Updated 11 months ago
- ☆15Updated 3 years ago
- Top ATT&CK Techniques helps defenders approach the breadth and complexity of MITRE ATT&CK® with a prioritized top 10 list of techniques t…☆115Updated 3 months ago
- Playbooks for SOC Analysts☆144Updated last year
- Configurations to implement Wazuh☆11Updated last year
- ☆15Updated last year
- ☆27Updated last year