juaromu / wazuh-opencti
☆33Updated last year
Alternatives and similar repositories for wazuh-opencti:
Users that are interested in wazuh-opencti are comparing it to the libraries listed below
- Personal scripts☆13Updated 6 months ago
- Wazuh extension looking up alert data against indicators in OpenCTI threat intel☆18Updated last year
- ☆31Updated 3 years ago
- Wazuh integration TheHive☆35Updated 2 years ago
- Integrate your Wazuh-Manager or Graylog with the SOCFortress Threat Intel Service☆28Updated 5 months ago
- Convert Sigma rules to Wazuh rules☆64Updated 11 months ago
- ☆15Updated 2 years ago
- ☆19Updated 3 years ago
- Useful scripts for those administering Wazuh☆80Updated 2 months ago
- These are open source rules that can be utilized with QRadar to detect various types of threats in the environment.☆54Updated 5 years ago
- Run Velociraptor on Security Onion☆37Updated 2 years ago
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆85Updated last year
- The Project can be used to integrate QRadar with MISP Threat Sharing Platform☆39Updated 2 years ago
- Docker image for Velocidex Velociraptor☆122Updated 2 weeks ago
- Sysmon and wazuh integration with Sigma sysmon rules [updated]☆64Updated 3 years ago
- Security Onion + Automation + Response Lab including n8n and Velociraptor☆107Updated 2 years ago
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆231Updated this week
- A collection of various SIEM rules relating to malware family groups.☆65Updated 9 months ago
- A Ruleset to enhance detection capabilities of Ossec using Sysmon☆91Updated 2 years ago
- Cybersecurity Incident Response Plan☆89Updated 4 years ago
- Docker image for MISP☆123Updated 2 months ago
- A collection of tips for using MISP.☆74Updated 3 months ago
- Resources To Learn And Understand SIGMA Rules☆173Updated 2 years ago
- Repository resource for threat hunter☆158Updated 6 years ago
- Awesome Splunk SPL hunt queries that can be used to detect the latest vulnerability exploitation attempts & subsequent compromise☆61Updated 10 months ago
- Practical Threat Detection Engineering, Published by Packt☆66Updated last year
- ☆68Updated 7 months ago
- (Unofficial) Wazuh integration to send alerts to IRIS.☆17Updated 2 months ago
- This repository contains Splunk queries to hunt some anomalies☆39Updated 2 years ago
- ☆101Updated this week