juaromu / wazuh-domain-stats-alienvaultLinks
☆16Updated 3 years ago
Alternatives and similar repositories for wazuh-domain-stats-alienvault
Users that are interested in wazuh-domain-stats-alienvault are comparing it to the libraries listed below
Sorting:
- ☆19Updated 3 years ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆71Updated 2 years ago
- ☆17Updated 2 years ago
- Repo for Automations and other solutions for Elastic SIEM/Security.☆18Updated 4 years ago
- Domain Response is a tool that is designed to help you automate the investigation for a domain. This tool is specificly designed to autom…☆49Updated last year
- Import CrowdStrike Threat Intelligence into your instance of MISP☆47Updated last month
- AIL project training materials☆34Updated 2 weeks ago
- Personal scripts☆15Updated 10 months ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆44Updated last year
- Open-source Fabric templates for cybersecurity and compliance☆21Updated 6 months ago
- A MITRE ATT&CK Lookup Tool☆45Updated last year
- The official Prelude SIEM GitHub of https://www.prelude-siem.org☆31Updated 9 years ago
- Security Onion + Automation + Response Lab including n8n and Velociraptor☆111Updated 2 years ago
- Tools for Wazuh by Juan C. Tello☆14Updated 3 years ago
- Lua plugin to extract data from Wireshark and convert it into MISP format☆48Updated last year
- A collection of tips for using MISP.☆74Updated 7 months ago
- Sharing Threat Hunting runbooks☆26Updated 6 years ago
- Extracting IoC data from eMail☆135Updated 3 weeks ago
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆34Updated 3 months ago
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆99Updated last year
- Collection of Dashboards for Threat Hunting and more!☆68Updated 4 years ago
- A collection of various SIEM rules relating to malware family groups.☆67Updated last year
- This script provides a Python library with methods to authenticate to various sources of threat intelligence and query IPs for the latest…☆18Updated 5 months ago
- Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https…☆126Updated last year
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆51Updated 6 months ago
- Sysmon and wazuh integration with Sigma sysmon rules [updated]☆68Updated 4 years ago
- Sigma detection rules for hunting with the threathunting-keywords project☆56Updated 5 months ago
- Incident Response Network Tools☆24Updated 4 years ago
- Passive OS detection based on SYN packets without Transmitting any Data☆47Updated 2 years ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆64Updated 2 years ago