gbrigandi / mcp-server-wazuhLinks
MCP Server for Wazuh SIEM
β13Updated 2 weeks ago
Alternatives and similar repositories for mcp-server-wazuh
Users that are interested in mcp-server-wazuh are comparing it to the libraries listed below
Sorting:
- π‘οΈ VIPER: Stay ahead of threats with AI-driven vulnerability intelligence. Prioritize CVEs effectively using NVD, EPSS, CISA KEV, and Goβ¦β37Updated this week
- Newly registered Domain Monitoring to detect phishing and brand impersonation with subdomain enumeration and source code scrapingβ51Updated 4 months ago
- Automation tool for Windows Deception Host Burn-Inβ86Updated 6 months ago
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor manβs SOC.β51Updated 4 months ago
- Lua plugin to extract data from Wireshark and convert it into MISP formatβ48Updated last year
- (Unofficial) Wazuh integration to send alerts to IRIS.β17Updated 5 months ago
- Explore the GOAD Active Directory lab in 5 minutes with Adalancheβ38Updated 4 months ago
- Shodan Monitoring integration for TheHive.β130Updated 5 months ago
- Scripts to deploy and update MISP in air-gapped environmentsβ17Updated 2 months ago
- Analyze pcaps with Zeek and a Grafana Dashboardβ177Updated last year
- Convert a variety of log formats to CSV while enriching detected IPs with Geolocation, ASN, DNS, WhoIs, Shodan InternetDB and Threat Indiβ¦β105Updated 7 months ago
- An index of publicly available and open-source threat detection rulesets.β112Updated last month
- β34Updated last year
- Signature based honeypot detector tool written in Golangβ95Updated 2 months ago
- β92Updated 2 weeks ago
- Online resources related to Detection Engineering. Detection rules, detection logic, attack samples, detection tests and emulation toolsβ¦β94Updated last week
- β16Updated 3 years ago
- Wazuh integration TheHiveβ35Updated 2 years ago
- Tools for Wazuh by Juan C. Telloβ14Updated 3 years ago
- Mapping of open-source detection rules and atomic tests.β166Updated 4 months ago
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the β¦β70Updated 11 months ago
- β73Updated 2 months ago
- Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Groupβ85Updated 4 months ago
- β19Updated 3 years ago
- Convert Sigma rules to SIEM queries, directly in your browser.β81Updated last week
- A tool to curate compelling news on cloud technologies and cybersecurity. By aggregating information from RSS feeds and Reddit, it identiβ¦β33Updated 9 months ago
- π§° ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.β74Updated last month
- OpenBAS Docker deployment helpersβ18Updated last week
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.β126Updated last year
- Convert Sigma rules to Wazuh rulesβ65Updated last year