guardicode / osqueryLinks
Guardicore osqueries collection for asset information, TH and compliance.
☆16Updated 4 years ago
Alternatives and similar repositories for osquery
Users that are interested in osquery are comparing it to the libraries listed below
Sorting:
- Run Velociraptor on Security Onion☆40Updated 3 years ago
- ☆88Updated 10 months ago
- ☆22Updated 3 years ago
- Collection of Dashboards for Threat Hunting and more!☆70Updated 5 years ago
- Useful scripts for those administering Wazuh☆90Updated this week
- Sysmon and wazuh integration with Sigma sysmon rules [updated]☆71Updated 4 years ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆79Updated 2 months ago
- Wazuh integration TheHive☆41Updated 2 years ago
- CrowdStrike's Open Source Policy & Contribution Guide☆47Updated last month
- ☆20Updated 2 years ago
- Integrate your Wazuh-Manager or Graylog with the SOCFortress Threat Intel Service☆32Updated last year
- Cybersecurity Incident Response Plan☆109Updated 5 years ago
- ☆15Updated 4 months ago
- Run zeek with zeekctl in docker☆60Updated last year
- ☆47Updated 3 years ago
- A curated list of awesome things related to TheHive & Cortex☆182Updated 4 years ago
- The Infosec Community Definitive Guide to Jupyter Notebooks☆130Updated 5 years ago
- A tool that allows you to document and assess any security automation in your SOC☆48Updated last year
- Official Palo Alto Networks MineMeld docker☆17Updated 5 years ago
- Import CrowdStrike Threat Intelligence into your instance of MISP☆49Updated 7 months ago
- MISP to Splunk Enterprise Security Theat Intelligence Framework Integration☆14Updated 2 years ago
- This repository is a comprehensive collection of resources, documentation, apps, and add-ons related to Splunk, a powerful data analytics…☆24Updated 3 weeks ago
- Corelight@Home script☆46Updated 2 years ago
- Leverage Sophos Central API☆30Updated 2 years ago
- Unofficial third-party scripts, playbooks, and content for IBM QRadar & QRadar Community Edition.☆87Updated 8 months ago
- Incident Response Methodologies (IRM), also called Incident Playbook, based on the work done by the CERT Societe General☆24Updated 4 years ago
- A list of resources to build a information security team.☆13Updated 4 years ago
- Synthetic Adversarial Log Objects: A Framework for synthentic log generation☆85Updated 2 years ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆49Updated last year
- ☆55Updated 4 years ago