crow1011 / wazuh2thehive
Wazuh integration TheHive
☆33Updated last year
Alternatives and similar repositories for wazuh2thehive:
Users that are interested in wazuh2thehive are comparing it to the libraries listed below
- Convert Sigma rules to Wazuh rules☆59Updated 9 months ago
- ☆33Updated last year
- Run Velociraptor on Security Onion☆37Updated 2 years ago
- ☆15Updated last year
- A Ruleset to enhance detection capabilities of Ossec using Sysmon☆87Updated 2 years ago
- ☆31Updated 3 years ago
- Personal scripts☆12Updated 4 months ago
- Sysmon and wazuh integration with Sigma sysmon rules [updated]☆62Updated 3 years ago
- Repository for SPEED SIEM Use Case Framework☆52Updated 4 years ago
- Cybersecurity Incident Response Plan☆88Updated 4 years ago
- A Sigma to Wazuh / OSSEC converter including a generated Windows Sysmon ruleset☆33Updated 4 years ago
- This is the One Stop place where you can several Detection Rules which can help you to kick start your journey on SIEM, SOC work.☆36Updated 3 years ago
- Awesome Splunk SPL hunt queries that can be used to detect the latest vulnerability exploitation attempts & subsequent compromise☆59Updated 8 months ago
- Repository resource for threat hunter☆158Updated 6 years ago
- Pathfinder is a plugin for mapping network vulnerabilities, scanned by CALDERA or imported by a supported network scanner, and translatin…☆125Updated 8 months ago
- CrowdStrike Falcon Queries For Advanced Threat Detection☆15Updated 2 years ago
- ☆48Updated 2 years ago
- ☆18Updated 3 years ago
- ☆116Updated last year
- Adversarial Interception Mission Oriented Discovery and Disruption Framework, or AIMOD2, is a structured threat hunting approach to proac…☆85Updated last year
- Docker image for MISP☆120Updated this week
- Technical add-on for Splunk related to TheHive/Cortex from TheHive project☆52Updated 2 months ago
- This repository contains Splunk queries to hunt some anomalies☆38Updated 2 years ago
- A collection of tips for using MISP.☆74Updated last month
- A curated list of awesome things related to TheHive & Cortex☆174Updated 3 years ago
- Docker configurations for TheHive, Cortex and 3rd party tools☆116Updated 2 years ago
- These are open source rules that can be utilized with QRadar to detect various types of threats in the environment.☆52Updated 5 years ago
- Useful scripts for those administering Wazuh☆78Updated this week
- ☆67Updated 5 months ago