crow1011 / wazuh2thehiveLinks
Wazuh integration TheHive
☆39Updated 2 years ago
Alternatives and similar repositories for wazuh2thehive
Users that are interested in wazuh2thehive are comparing it to the libraries listed below
Sorting:
- ☆39Updated 2 years ago
- Docker configurations for TheHive, Cortex and 3rd party tools☆126Updated 2 years ago
- ☆19Updated 2 years ago
- SECMON is a web-based tool for the automation of infosec watching and vulnerability management with a web interface.☆219Updated 3 years ago
- Convert Sigma rules to Wazuh rules☆72Updated 2 weeks ago
- Run Velociraptor on Security Onion☆40Updated 3 years ago
- A Ruleset to enhance detection capabilities of Ossec using Sysmon☆95Updated 3 years ago
- Sysmon and wazuh integration with Sigma sysmon rules [updated]☆70Updated 4 years ago
- Cybersecurity Incident Response Plan☆105Updated 5 years ago
- Roota is a public-domain language of threat detection and response that combines native queries from a SIEM, EDR, XDR, or Data Lake with …☆130Updated last year
- Personal scripts☆15Updated last year
- Useful scripts for those administering Wazuh☆86Updated last week
- MISP Playbooks☆211Updated 3 months ago
- ☆119Updated 2 years ago
- ☆32Updated 3 years ago
- Newly registered Domain Monitoring to detect phishing and brand impersonation with subdomain enumeration and source code scraping☆55Updated 2 months ago
- This is the One Stop place where you can several Detection Rules which can help you to kick start your journey on SIEM, SOC work.☆40Updated 4 years ago
- Repository resource for threat hunter☆158Updated 7 years ago
- Standard-Format Threat Intelligence Feeds☆122Updated last week
- Security Onion + Automation + Response Lab including n8n and Velociraptor☆112Updated 3 years ago
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆100Updated last year
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆58Updated 3 years ago
- ☆19Updated 3 years ago
- Docker image for MISP☆134Updated last month
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆49Updated last year
- MAD ATT&CK Defender: ATT&CK Adversary Emulation Repository☆120Updated 2 years ago
- Pathfinder is a plugin for mapping network vulnerabilities, scanned by CALDERA or imported by a supported network scanner, and translatin…☆126Updated 6 months ago
- Blue Team detection lab created with Terraform and Ansible in Azure.☆162Updated 10 months ago
- Awesome Splunk SPL hunt queries that can be used to detect the latest vulnerability exploitation attempts & subsequent compromise☆66Updated last year
- SOARCA - The Open Source CACAO-based Security Orchestrator!☆83Updated last month