juaromu / wazuh-domain-stats-alienvault
☆16Updated 3 years ago
Alternatives and similar repositories for wazuh-domain-stats-alienvault:
Users that are interested in wazuh-domain-stats-alienvault are comparing it to the libraries listed below
- ☆19Updated 3 years ago
- ☆15Updated 2 years ago
- Repo for Automations and other solutions for Elastic SIEM/Security.☆18Updated 3 years ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆71Updated last year
- Personal scripts☆13Updated 6 months ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆39Updated 10 months ago
- Tools for Wazuh by Juan C. Tello☆14Updated 3 years ago
- Threat Simulator for Enterprise Networks☆14Updated 2 years ago
- Incident Response Network Tools☆24Updated 3 years ago
- A MITRE ATT&CK Lookup Tool☆45Updated 10 months ago
- Import CrowdStrike Threat Intelligence into your instance of MISP☆44Updated last week
- Domain Response is a tool that is designed to help you automate the investigation for a domain. This tool is specificly designed to autom…☆47Updated 11 months ago
- Run Velociraptor on Security Onion☆37Updated 2 years ago
- Defence Against the Dark Arts☆34Updated 5 years ago
- Open-source Fabric templates for cybersecurity and compliance☆16Updated 2 months ago
- Sigma detection rules for hunting with the threathunting-keywords project☆55Updated 2 weeks ago
- Sharing Threat Hunting runbooks☆25Updated 5 years ago
- Lua plugin to extract data from Wireshark and convert it into MISP format☆47Updated last year
- Convert Sigma rules to Wazuh rules☆64Updated 11 months ago
- ☆52Updated this week
- MasterParser is a simple, all-in-one, digital forensics artifact parser☆23Updated 3 years ago
- DNS Dashboard for hunting and identifying beaconing☆15Updated 4 years ago
- Incident Response Plan for all major incidents including cheatsheets for both linux and windows☆14Updated 4 years ago
- A list of resources to build a information security team.☆13Updated 4 years ago
- Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.☆24Updated 8 years ago
- AIL project training materials☆28Updated last month
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆18Updated last year
- Network security visualization tool, showcasing live traffic between internal and external hosts in a real-time visualization.☆25Updated last year
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆61Updated last year
- A collection of tips for using MISP.☆74Updated 3 months ago