SOAR Automation with Shuffle, Wazuh & TheHive | This project integrates Shuffle SOAR, Wazuh SIEM, and TheHive to automate security incident response. It enriches alerts using VirusTotal & AbuseIPDB, creates incidents in TheHive, and sends real-time Discord notifications.
☆123Feb 21, 2025Updated last year
Alternatives and similar repositories for SOAR-Flow
Users that are interested in SOAR-Flow are comparing it to the libraries listed below
Sorting:
- ☆12Feb 9, 2025Updated last year
- Smarter Asset Search, Faster Information Extraction ZoomEye GPT is a browser extension designed specifically for cybersecurity profession…☆24Apr 30, 2025Updated 10 months ago
- ☆15Apr 10, 2025Updated 10 months ago
- Repo of python/bash scripts for identifying IoC's in threat feed and other online tools☆26Jul 27, 2020Updated 5 years ago
- Advanced Threat Hunting: Ransomware Group☆29Jul 9, 2025Updated 7 months ago
- This project automates SOC workflows using Wazuh, Shuffle, and TheHive. It involves setting up a Windows 10 client with Sysmon and Ubuntu…☆36Jun 7, 2024Updated last year
- Security Monitoring using Wazuh, published by Packt☆37Mar 28, 2024Updated last year
- ☆11Jun 12, 2023Updated 2 years ago
- If you a security engineer or an aspirant Security professional then Setting up a Wazuh home lab environment is an excellent way for SOC …☆17Mar 27, 2024Updated last year
- Pentest automation resources for Burp☆15Mar 10, 2024Updated last year
- A tool for secrets management, encryption as a service, and privileged access management☆13Jul 17, 2025Updated 7 months ago
- ☆20Apr 10, 2025Updated 10 months ago
- Scripts for importing threat feeds and CTI articles, blogs, and reports into MISP.☆18Jun 16, 2025Updated 8 months ago
- CSF Firewall and AbuseIPDB API integration with specific focus on data privacy and prevention of sensitive data leaked to public AbuseIPD…☆16Mar 20, 2024Updated last year
- A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.☆33Jul 23, 2024Updated last year
- ☆34Mar 4, 2019Updated 6 years ago
- Cheat sheets for threat hunting, detection and other stuff.☆34Oct 7, 2022Updated 3 years ago
- Threat Detection System using Hybrid (Machine Learning + Lexical Analysis) learning Approach.☆11May 30, 2017Updated 8 years ago
- A walkthrough of creating and using the Azure environment and Microsoft Sentinel to track attacks and plot attacks on a live map.☆23Mar 26, 2023Updated 2 years ago
- Setting up Active Directory with an Ansible Playbook and create some groups and users☆17Jun 9, 2023Updated 2 years ago
- MISP to Sentinel integration☆79Feb 6, 2026Updated 3 weeks ago
- VTC - Velociraptor Timeline Creator☆19May 15, 2024Updated last year
- ☆20Feb 3, 2026Updated 3 weeks ago
- ☆16Aug 29, 2025Updated 6 months ago
- Collection of Jupyter Notebook for Threat Hunting and Blue Team Purposes☆22Jun 15, 2022Updated 3 years ago
- The Threat Actor Profile Guide for CTI Analysts☆116Jul 15, 2023Updated 2 years ago
- ☆51Nov 26, 2025Updated 3 months ago
- ☆21Apr 19, 2024Updated last year
- ThreatSeeker: Threat Hunting via Windows Event Logs☆124May 16, 2023Updated 2 years ago
- In this projects are custom-decoders and custom-rules for Wazuh by me. Feel free to use it, you can redistribute it and/or modify it unde…☆59Dec 19, 2025Updated 2 months ago
- ☆46Jul 9, 2024Updated last year
- This Repository consists all Public Cheatsheets created by BlackPerl DFIR Content Team☆20Oct 9, 2024Updated last year
- GRC (Governance, Risk and Compliance) Software, to manage risks and controls. It is based in best practices and helps organizations to ma…☆27Mar 8, 2023Updated 2 years ago
- INE eCPPTv3 Cheat Sheet / Course Notes. You'll find my comprehensive course notes, which also serve as cheat sheets for the eCPPTv3 cours…☆63Aug 24, 2025Updated 6 months ago
- Three complete IT / Cybersecurity resume for the following job roles: Systems Administration, SOC Analyst, & Penetration Tester.☆26Apr 2, 2025Updated 11 months ago
- A dataset containing Office 365 Unified Audit Logs for security research and detection☆58Jun 7, 2022Updated 3 years ago
- MISP Playbooks☆222Oct 14, 2025Updated 4 months ago
- ☆24May 22, 2024Updated last year
- List of custom developed KQL queries to help proactive security teams hunt for opportunistic and sophisticated threat activity by develop…☆26Jun 30, 2021Updated 4 years ago