guardicode / osqueryLinks
Guardicore osqueries collection for asset information, TH and compliance.
☆15Updated 3 years ago
Alternatives and similar repositories for osquery
Users that are interested in osquery are comparing it to the libraries listed below
Sorting:
- Run Velociraptor on Security Onion☆40Updated 3 years ago
- ☆88Updated 8 months ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆80Updated last month
- Collection of Dashboards for Threat Hunting and more!☆70Updated 5 years ago
- CrowdStrike's Open Source Policy & Contribution Guide☆45Updated this week
- Sysmon and wazuh integration with Sigma sysmon rules [updated]☆70Updated 4 years ago
- A tool that allows you to document and assess any security automation in your SOC☆47Updated last year
- This repository is a comprehensive collection of resources, documentation, apps, and add-ons related to Splunk, a powerful data analytics…☆23Updated 3 weeks ago
- ☆55Updated 4 years ago
- ☆21Updated 3 years ago
- Wazuh integration TheHive☆40Updated 2 years ago
- ☆15Updated 3 months ago
- Controls Assessment Specification☆70Updated 7 months ago
- Run zeek with zeekctl in docker☆56Updated last year
- Home for Splunk security datasets.☆126Updated 5 years ago
- Unofficial third-party scripts, playbooks, and content for IBM QRadar & QRadar Community Edition.☆86Updated 6 months ago
- This TA takes Suricata5 data from your port mirrored Suricata server and makes it readable within Splunk. See Cheatsheets on how to setup…☆15Updated 5 years ago
- The Infosec Community Definitive Guide to Jupyter Notebooks☆129Updated 5 years ago
- Tool to extract Sessions, MessageID(s) and find the emails belonging to MessageID(s). This script utilizes the MailItemsAccessed features…☆41Updated 5 years ago
- Corelight@Home script☆45Updated 2 years ago
- Useful scripts for those administering Wazuh☆87Updated 2 weeks ago
- Cybersecurity Incident Response Plan☆109Updated 5 years ago
- Official Palo Alto Networks MineMeld docker☆17Updated 5 years ago
- ☆47Updated 3 years ago
- ☆120Updated last month
- Incident Response Methodologies (IRM), also called Incident Playbook, based on the work done by the CERT Societe General☆24Updated 3 years ago
- Security Onion + Automation + Response Lab including n8n and Velociraptor☆112Updated 3 years ago
- CrowdStrike Falcon Queries For Advanced Threat Detection☆27Updated 8 months ago
- Synthetic Adversarial Log Objects: A Framework for synthentic log generation☆85Updated last year
- ☆19Updated 3 years ago