juaromu / wazuh-nmapLinks
☆17Updated 3 years ago
Alternatives and similar repositories for wazuh-nmap
Users that are interested in wazuh-nmap are comparing it to the libraries listed below
Sorting:
- ☆18Updated 2 years ago
- Useful scripts for those administering Wazuh☆85Updated this week
- Tools for Wazuh by Juan C. Tello☆14Updated 3 years ago
- Wazuh integration TheHive☆38Updated 2 years ago
- Sysmon and wazuh integration with Sigma sysmon rules [updated]☆69Updated 4 years ago
- Parse wazuh[HIDS] alerts into ECS mapping using Filebeat☆27Updated 5 years ago
- Kibana 7 Templates for Suricata IDPS Threat Hunting☆43Updated last week
- Our collection of Wazuh detection rules for our Offense Lab☆15Updated 3 years ago
- A Ruleset to enhance detection capabilities of Ossec using Sysmon☆95Updated 3 years ago
- ☆37Updated 2 years ago
- Wazuh - Splunk App☆56Updated 11 months ago
- Docker configurations for TheHive, Cortex and 3rd party tools☆126Updated 2 years ago
- ☆19Updated 3 years ago
- Threat Intelligence with Elastic - Minemeld integration with Elasticsearch☆19Updated 4 years ago
- Kibana 6 Templates for Suricata IDPS Threat Hunting☆24Updated 6 years ago
- The Project can be used to integrate QRadar with MISP Threat Sharing Platform☆40Updated 3 years ago
- Repo for Automations and other solutions for Elastic SIEM/Security.☆18Updated 4 years ago
- Sample programs to access the API☆91Updated 4 months ago
- Wazuh - RESTful API☆76Updated 11 months ago
- Run zeek with zeekctl in docker☆55Updated last year
- Docker image for MISP☆134Updated last month
- Import CrowdStrike Threat Intelligence into your instance of MISP☆48Updated 3 months ago
- Zabbix Templates and scripts to monitor OSSEC or Wazuh Manager Intrusion Detection☆13Updated 5 years ago
- Convert Sigma rules to Wazuh rules☆71Updated last year
- Run Velociraptor on Security Onion☆39Updated 3 years ago
- Incident Response Network Tools☆24Updated 4 years ago
- RPM packages for MISP☆37Updated 2 weeks ago
- Collection of Dashboards for Threat Hunting and more!☆69Updated 4 years ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆73Updated 2 years ago
- The FASTEST way to consume threat intel.☆68Updated 2 years ago