jctello / JCT-WazuhLinks
Tools for Wazuh by Juan C. Tello
☆14Updated 3 years ago
Alternatives and similar repositories for JCT-Wazuh
Users that are interested in JCT-Wazuh are comparing it to the libraries listed below
Sorting:
- ☆19Updated 3 years ago
- Personal scripts☆14Updated 8 months ago
- ☆17Updated 3 years ago
- Wazuh integration TheHive☆35Updated 2 years ago
- ☆17Updated 2 years ago
- ☆16Updated 3 years ago
- Repo for Automations and other solutions for Elastic SIEM/Security.☆18Updated 3 years ago
- Workflows for Shuffle☆23Updated 2 years ago
- Osquery Packs we use for customer security hardening☆12Updated 7 months ago
- Convert Sigma rules to Wazuh rules☆65Updated last year
- Our collection of Wazuh detection rules for our Offense Lab☆14Updated 3 years ago
- Useful scripts for those administering Wazuh☆83Updated this week
- Integrate your Wazuh-Manager or Graylog with the SOCFortress Threat Intel Service☆29Updated 8 months ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆43Updated last year
- (Unofficial) Wazuh integration to send alerts to IRIS.☆17Updated 5 months ago
- ☆34Updated last year
- Parse wazuh[HIDS] alerts into ECS mapping using Filebeat☆27Updated 4 years ago
- Run Velociraptor on Security Onion☆37Updated 2 years ago
- Kibana 7 Templates for Suricata IDPS Threat Hunting☆40Updated 2 years ago
- Sysmon and wazuh integration with Sigma sysmon rules [updated]☆66Updated 3 years ago
- A Sigma to Wazuh / OSSEC converter including a generated Windows Sysmon ruleset☆33Updated 4 years ago
- Zabbix Templates and scripts to monitor OSSEC or Wazuh Manager Intrusion Detection☆13Updated 5 years ago
- DNS Dashboard for hunting and identifying beaconing☆16Updated 4 years ago
- Kibana 6 Templates for Suricata IDPS Threat Hunting☆24Updated 6 years ago
- AIL project training materials☆30Updated last week
- Lua plugin to extract data from Wireshark and convert it into MISP format☆48Updated last year
- OpenCTI–Wazuh connector looking for indicators in Wazuh and creating sightings☆17Updated 9 months ago
- A collection of tips for using MISP.☆74Updated 5 months ago
- ☆48Updated last week
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysis☆22Updated 3 months ago