juaromu / wazuh-opencti
☆33Updated last year
Related projects ⓘ
Alternatives and complementary repositories for wazuh-opencti
- ☆15Updated last year
- Personal scripts☆12Updated 2 months ago
- Convert Sigma rules to Wazuh rules☆58Updated 7 months ago
- Integrate your Wazuh-Manager or Graylog with the SOCFortress Threat Intel Service☆24Updated last month
- Wazuh integration TheHive☆33Updated last year
- Wazuh extension looking up alert data against indicators in OpenCTI threat intel☆17Updated 9 months ago
- These are open source rules that can be utilized with QRadar to detect various types of threats in the environment.☆51Updated 5 years ago
- Useful scripts for those administering Wazuh☆72Updated 3 months ago
- Docker image for Velocidex Velociraptor☆113Updated 4 months ago
- Sysmon and wazuh integration with Sigma sysmon rules [updated]☆61Updated 3 years ago
- A collection of tips for using MISP.☆74Updated 7 months ago
- ☆31Updated 2 years ago
- Playbooks for SOC Analysts☆144Updated last year
- A production ready Dockered MISP☆169Updated this week
- Run Velociraptor on Security Onion☆34Updated 2 years ago
- This is the One Stop place where you can find almost all of your Tools of Requirements in DFIR☆71Updated 2 years ago
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆204Updated last year
- Cybersecurity Incident Response Plan☆87Updated 4 years ago
- A Ruleset to enhance detection capabilities of Ossec using Sysmon☆87Updated 2 years ago
- Practical Threat Detection Engineering, Published by Packt☆59Updated last year
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆75Updated 11 months ago
- Security Onion + Automation + Response Lab including n8n and Velociraptor☆105Updated 2 years ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆38Updated 6 months ago
- Resources To Learn And Understand SIGMA Rules☆168Updated last year
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆116Updated 11 months ago
- Import CrowdStrike Threat Intelligence into your instance of MISP☆42Updated last month
- Docker image for MISP☆115Updated this week
- ☆41Updated 2 years ago
- Tools for simulating threats☆177Updated last year
- The Project can be used to integrate QRadar with MISP Threat Sharing Platform☆39Updated 2 years ago