juaromu / wazuh-openctiLinks
☆37Updated last year
Alternatives and similar repositories for wazuh-opencti
Users that are interested in wazuh-opencti are comparing it to the libraries listed below
Sorting:
- ☆17Updated 2 years ago
- Convert Sigma rules to Wazuh rules☆67Updated last year
- Personal scripts☆15Updated 10 months ago
- A production ready Dockered MISP☆259Updated this week
- Wazuh integration TheHive☆38Updated 2 years ago
- Integrate your Wazuh-Manager or Graylog with the SOCFortress Threat Intel Service☆29Updated 10 months ago
- Docker configurations for TheHive, Cortex and 3rd party tools☆126Updated 2 years ago
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆261Updated 4 months ago
- MISP Playbooks☆205Updated last month
- Docker image for MISP☆132Updated last month
- Wazuh extension looking up alert data against indicators in OpenCTI threat intel☆20Updated last year
- A curated repository of incident response playbooks☆93Updated 2 years ago
- Docker image for Velocidex Velociraptor☆131Updated 4 months ago
- A list of Splunk queries that I've collected and used over time.☆85Updated 4 years ago
- Cyber Incident Response Team Playbook Battle Cards☆383Updated last year
- ☆31Updated 3 years ago
- Open Source Platform for storing, organizing, and searching documents related to cyber threats☆164Updated last year
- This is the One Stop place where you can find almost all of your Tools of Requirements in DFIR☆78Updated 3 years ago
- Security Onion + Automation + Response Lab including n8n and Velociraptor☆111Updated 2 years ago
- Tools for simulating threats☆190Updated last year
- Useful scripts for those administering Wazuh☆84Updated last month
- SOARCA - The Open Source CACAO-based Security Orchestrator!☆76Updated this week
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆96Updated last year
- Resources To Learn And Understand SIGMA Rules☆180Updated 2 years ago
- These are open source rules that can be utilized with QRadar to detect various types of threats in the environment.☆55Updated 6 years ago
- ☆45Updated 2 years ago
- SOCFortress CoPilot☆306Updated last week
- Practical Threat Detection Engineering, Published by Packt☆76Updated 2 years ago
- Roota is a public-domain language of threat detection and response that combines native queries from a SIEM, EDR, XDR, or Data Lake with …☆128Updated last year
- Sysmon and wazuh integration with Sigma sysmon rules [updated]☆68Updated 4 years ago