juaromu / wazuh-nmapLinks
☆19Updated 3 years ago
Alternatives and similar repositories for wazuh-nmap
Users that are interested in wazuh-nmap are comparing it to the libraries listed below
Sorting:
- ☆19Updated 2 years ago
- Useful scripts for those administering Wazuh☆87Updated last month
- Wazuh integration TheHive☆39Updated 2 years ago
- Sysmon and wazuh integration with Sigma sysmon rules [updated]☆70Updated 4 years ago
- Tools for Wazuh by Juan C. Tello☆15Updated 3 years ago
- Integrate your Wazuh-Manager or Graylog with the SOCFortress Threat Intel Service☆30Updated last year
- Docker configurations for TheHive, Cortex and 3rd party tools☆126Updated 2 years ago
- ☆39Updated 2 years ago
- A Ruleset to enhance detection capabilities of Ossec using Sysmon☆94Updated 3 years ago
- Sample programs to access the API☆93Updated 6 months ago
- ☆19Updated 4 years ago
- Our collection of Wazuh detection rules for our Offense Lab☆16Updated 3 years ago
- Collection of Dashboards for Threat Hunting and more!☆70Updated 5 years ago
- ☆17Updated 4 years ago
- Parse wazuh[HIDS] alerts into ECS mapping using Filebeat☆28Updated 5 years ago
- Import CrowdStrike Threat Intelligence into your instance of MISP☆48Updated 4 months ago
- Repo for Automations and other solutions for Elastic SIEM/Security.☆18Updated 4 years ago
- Kibana 7 Templates for Suricata IDPS Threat Hunting☆43Updated last week
- Run Velociraptor on Security Onion☆40Updated 3 years ago
- Convert snort IPS signatures to FortiGate custom IPS signature syntax.☆40Updated 9 months ago
- 🚀 IRIS-SOAR: Modular SOAR (Security Orchestration, Automation, and Response) implementation in Python. Designed to complement DFIR-IRIS …☆11Updated last year
- Zabbix Templates and scripts to monitor OSSEC or Wazuh Manager Intrusion Detection☆15Updated last month
- Standard-Format Threat Intelligence Feeds☆124Updated this week
- Docker image for MISP☆135Updated 2 months ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆49Updated last year
- Convert Sigma rules to Wazuh rules☆73Updated last month
- Wazuh - Splunk App☆56Updated last year
- ☆96Updated 3 weeks ago
- Open-source powered SIEM, Vulnerability Scanning, Host- & Network-IDS. Built upon Elastic Stack, OpenVAS, Suricata. Wrapped in a Python F…☆15Updated 3 years ago
- A tool that allows you to document and assess any security automation in your SOC☆47Updated 11 months ago