jctello / JCT-WazuhLinks
Tools for Wazuh by Juan C. Tello
☆15Updated 3 years ago
Alternatives and similar repositories for JCT-Wazuh
Users that are interested in JCT-Wazuh are comparing it to the libraries listed below
Sorting:
- ☆19Updated 3 years ago
- Repo for Automations and other solutions for Elastic SIEM/Security.☆18Updated 4 years ago
- Personal scripts☆15Updated last year
- Osquery Packs we use for customer security hardening☆12Updated 3 months ago
- ☆19Updated 4 years ago
- Wazuh integration TheHive☆39Updated 2 years ago
- ☆19Updated 2 years ago
- ☆17Updated 4 years ago
- Sysmon and wazuh integration with Sigma sysmon rules [updated]☆70Updated 4 years ago
- Workflows for Shuffle☆23Updated 2 years ago
- Kibana 7 Templates for Suricata IDPS Threat Hunting☆43Updated last month
- AIL project training materials☆36Updated 3 months ago
- Useful scripts for those administering Wazuh☆87Updated last month
- A collection of tips for using MISP.☆74Updated 10 months ago
- Corelight@Home script☆44Updated 2 years ago
- An Ansible playbook for deploying the Suricata intrusion detection system and fetching Snort rules with Oinkmaster.☆17Updated 3 years ago
- Website for ail-typo-squatting library☆66Updated 2 weeks ago
- OpenCTI–Wazuh connector looking for indicators in Wazuh and creating sightings☆21Updated last year
- Convert Sigma rules to Wazuh rules☆73Updated last month
- Sample programs to access the API☆93Updated 5 months ago
- 🚀 IRIS-SOAR: Modular SOAR (Security Orchestration, Automation, and Response) implementation in Python. Designed to complement DFIR-IRIS …☆11Updated last year
- ☆39Updated 2 years ago
- The official Prelude SIEM GitHub of https://www.prelude-siem.org☆33Updated 9 years ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆65Updated 3 years ago
- A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the…☆63Updated 2 years ago
- Wazuh extension looking up alert data against indicators in OpenCTI threat intel☆22Updated last year
- Kibana 6 Templates for Suricata IDPS Threat Hunting☆24Updated 6 years ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆49Updated last year
- An experimental Velociraptor implementation using cloud infrastructure☆26Updated last week
- Run Velociraptor on Security Onion☆40Updated 3 years ago