In this projects are custom-decoders and custom-rules for Wazuh by me. Feel free to use it, you can redistribute it and/or modify it under the terms of GPLv2. Cybersecurity is hard, so let's work together.
☆60Mar 7, 2026Updated 3 weeks ago
Alternatives and similar repositories for wazuh-custom-rules-and-decoders
Users that are interested in wazuh-custom-rules-and-decoders are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Our collection of Wazuh detection rules for our Offense Lab☆18Feb 13, 2022Updated 4 years ago
- Repo to hold wazuh manager mcp server☆75Sep 22, 2025Updated 6 months ago
- Advanced Wazuh Rules for more accurate threat detection. Feel free to implement within your own Wazuh environment, contribute, or fork!☆1,264Mar 11, 2026Updated 2 weeks ago
- Sigma to Wazuh rule converter☆18Sep 28, 2025Updated 6 months ago
- MCP Server for Wazuh SIEM☆188Dec 12, 2025Updated 3 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A configuration to allow Wazuh to communicate with ChatGPT, based on https://loggar.hashnode.dev/augmenting-wazuh-with-chatgpt-integratio…☆24Mar 20, 2023Updated 3 years ago
- Zabbix 7 IT Infrastructure Monitoring Cookbook, published by packt☆30May 5, 2025Updated 10 months ago
- AI-Driven Breach and Attack Simulation Tool (Initial Proof of Concept for AI Pentest Copilot)☆26Jan 6, 2025Updated last year
- Sharing Knowledge "Hands On Scraping Data dengan kasus Analisis Sentimen pada Kebijakan Pemerintah"☆23May 28, 2025Updated 10 months ago
- ☆20Feb 14, 2026Updated last month
- Template injection allows an attacker to include template code into an existant (or not) template. A template engine makes designing HTML…☆13Jan 30, 2020Updated 6 years ago
- CEH Practical Preparation☆12Oct 2, 2022Updated 3 years ago
- RuleVis is a powerful analysis tool that transforms your Wazuh ruleset into a dynamic, interactive force-directed graph. It helps you vis…☆25Nov 12, 2025Updated 4 months ago
- Wazuh extension looking up alert data against indicators in OpenCTI threat intel☆21Feb 4, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆14Feb 8, 2020Updated 6 years ago
- This is a collection of Bug Bounty Tips collected from security researchers / bug hunters on Twitter.☆13Feb 19, 2021Updated 5 years ago
- Web Desktop App Using Integrated Extjs 4.2 and Node.js☆14Apr 6, 2016Updated 9 years ago
- Tools for Incident Response and Malware Analysis☆11Feb 9, 2025Updated last year
- Postman collection to work with Sophos Central APIs☆26Jan 8, 2026Updated 2 months ago
- A compilation of resources for studying for the eCPPTv2☆18Sep 28, 2022Updated 3 years ago
- Scan SSL based TCP services, ips, ports and network ranges to obtain certificate expiry data. Get automated alerts about certificates exp…☆29Feb 20, 2016Updated 10 years ago
- CVE-2025-49144 PoC for security researchers to test and try.☆86Jun 30, 2025Updated 8 months ago
- AISA-Scanner is an AI-powered autonomous vulnerability scanner that maps CVEs to metasploit exploits, MITRE, CEH, and SANS, delivering in…☆33Jul 31, 2025Updated 7 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Python Script to check website for username☆30May 4, 2025Updated 10 months ago
- Automatically exported from code.google.com/p/fuzzdb☆13Mar 23, 2015Updated 11 years ago
- patch to apply to a netbox installation to add beautiful topology view to sites☆13Mar 21, 2019Updated 7 years ago
- ☆20Jan 20, 2023Updated 3 years ago
- NeXSS is a modern, self-hosted Blind XSS (Cross-Site Scripting) hunter and callback listener built with Next.js. It helps security resear…☆30Jan 14, 2026Updated 2 months ago
- This repository is dedicated to documenting and sharing bug bounty reports. The goal is to help security researchers and developers: Le…☆13Mar 4, 2026Updated 3 weeks ago
- An open source platform to support analysts to organise their case and tasks☆129Updated this week
- Repo to hold mcp server for velociraptor☆33Jul 27, 2025Updated 8 months ago
- Incident Response automation scripts☆16Sep 5, 2025Updated 6 months ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Useful scripts for those administering Wazuh☆93Jan 6, 2026Updated 2 months ago
- Documentation sources for syslog-ng Open Source Edition (https://github.com/syslog-ng/syslog-ng)☆10May 6, 2024Updated last year
- PostWoman 💅 is a lightweight Postman alternative designed specifically for macOS☆29Jan 16, 2026Updated 2 months ago
- An Ansible playbook to setup my Ubuntu system☆11Apr 22, 2016Updated 9 years ago
- AD concepts, attack surfaces and attack vectors notes, slides, video...☆17Dec 6, 2024Updated last year
- ☆22Jan 31, 2023Updated 3 years ago
- Official Website Of The Sigma Project☆23Feb 16, 2026Updated last month