juaromu / wazuh
☆19Updated 3 years ago
Alternatives and similar repositories for wazuh:
Users that are interested in wazuh are comparing it to the libraries listed below
- ☆16Updated 3 years ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆40Updated last year
- Sigma detection rules for hunting with the threathunting-keywords project☆55Updated 2 months ago
- A collection of Sigma rules organized by MITRE ATT&CK technique☆17Updated 3 years ago
- Threat Detection & Anomaly Detection rules for popular open-source components☆51Updated 2 years ago
- Library of threat hunts to get any user started!☆44Updated 4 years ago
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆27Updated last week
- Repo for Automations and other solutions for Elastic SIEM/Security.☆18Updated 3 years ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆70Updated last year
- Sysmon and wazuh integration with Sigma sysmon rules [updated]☆65Updated 3 years ago
- Run Velociraptor on Security Onion☆37Updated 2 years ago
- A collection of tips for using MISP.☆74Updated 4 months ago
- Personal scripts☆13Updated 7 months ago
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆30Updated 2 weeks ago
- Workflows for Shuffle☆21Updated 2 years ago
- Convert Sigma rules to Wazuh rules☆64Updated last year
- An experimental Velociraptor implementation using cloud infrastructure☆25Updated 3 weeks ago
- Merge of two major cyber adversary datasets, MITRE ATT&CK and ETDA/ThaiCERT Threat Actor Cards, enabling victim/motivation-adversary-tech…☆53Updated 2 years ago
- Sharing Threat Hunting runbooks☆25Updated 5 years ago
- Awesome Splunk SPL hunt queries that can be used to detect the latest vulnerability exploitation attempts & subsequent compromise☆63Updated last year
- A Sigma to Wazuh / OSSEC converter including a generated Windows Sysmon ruleset☆33Updated 4 years ago
- TheHiveIRPlaybook is a collection of TheHive case templates used for Incident Response☆13Updated 4 years ago
- Automatic detection engineering technical state compliance☆55Updated 9 months ago
- User Feedback Space of #MitreAssistant☆37Updated last year
- Azure function to insert MISP data in to Azure Sentinel☆32Updated 2 years ago
- AIL project training materials☆29Updated 3 months ago
- Online resources related to Detection Engineering. Detection rules, detection logic, attack samples, detection tests and emulation tools…☆90Updated last week
- Repository for SPEED SIEM Use Case Framework☆53Updated 5 years ago
- ☆87Updated 2 months ago
- Slides of my public talks☆55Updated last year