juaromu / wazuh-opencti
☆33Updated last year
Alternatives and similar repositories for wazuh-opencti:
Users that are interested in wazuh-opencti are comparing it to the libraries listed below
- Wazuh extension looking up alert data against indicators in OpenCTI threat intel☆18Updated last year
- Personal scripts☆12Updated 6 months ago
- Wazuh integration TheHive☆34Updated 2 years ago
- ☆15Updated 2 years ago
- Docker image for Velocidex Velociraptor☆120Updated last week
- Convert Sigma rules to Wazuh rules☆63Updated 10 months ago
- Run Velociraptor on Security Onion☆37Updated 2 years ago
- Integrate your Wazuh-Manager or Graylog with the SOCFortress Threat Intel Service☆28Updated 5 months ago
- These are open source rules that can be utilized with QRadar to detect various types of threats in the environment.☆54Updated 5 years ago
- ☆18Updated 3 years ago
- A Ruleset to enhance detection capabilities of Ossec using Sysmon☆91Updated 2 years ago
- Useful scripts for those administering Wazuh☆80Updated last month
- Security Onion + Automation + Response Lab including n8n and Velociraptor☆107Updated 2 years ago
- Sysmon and wazuh integration with Sigma sysmon rules [updated]☆64Updated 3 years ago
- ☆31Updated 3 years ago
- Cybersecurity Incident Response Plan☆89Updated 4 years ago
- A collection of various SIEM rules relating to malware family groups.☆65Updated 8 months ago
- ☆42Updated 2 years ago
- MISP Playbooks☆186Updated last month
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆85Updated last year
- CrowdStrike Falcon Queries For Advanced Threat Detection☆16Updated last week
- Awesome Splunk SPL hunt queries that can be used to detect the latest vulnerability exploitation attempts & subsequent compromise☆61Updated 10 months ago
- Tools for simulating threats☆181Updated last year
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆39Updated 10 months ago
- This repository contains Splunk queries to hunt some anomalies☆38Updated 2 years ago
- Docker image for MISP☆123Updated last month
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆229Updated last year
- Resources To Learn And Understand SIGMA Rules☆173Updated 2 years ago
- This is the One Stop place where you can find almost all of your Tools of Requirements in DFIR☆77Updated 3 years ago
- Incident Response Methodologies (IRM), also called Incident Playbook, based on the work done by the CERT Societe General☆23Updated 3 years ago