nateuribe / Wazuh-IRIS-integration
(Unofficial) Wazuh integration to send alerts to IRIS.
☆16Updated 3 weeks ago
Alternatives and similar repositories for Wazuh-IRIS-integration:
Users that are interested in Wazuh-IRIS-integration are comparing it to the libraries listed below
- ☆33Updated last year
- ☆15Updated 2 years ago
- Integrate your Wazuh-Manager or Graylog with the SOCFortress Threat Intel Service☆28Updated 4 months ago
- Wazuh integration TheHive☆34Updated last year
- Personal scripts☆12Updated 4 months ago
- SOCFortress CoPilot☆242Updated this week
- OpenCTI–Wazuh connector looking for indicators in Wazuh and creating sightings☆16Updated 5 months ago
- Useful scripts for those administering Wazuh☆79Updated 2 weeks ago
- ☆31Updated 3 years ago
- ☆18Updated 3 years ago
- Convert Sigma rules to Wazuh rules☆60Updated 9 months ago
- ☆95Updated 2 weeks ago
- ☆67Updated 5 months ago
- A curated repository of incident response playbooks☆70Updated last year
- Docker image for Velocidex Velociraptor☆118Updated 7 months ago
- Tools for Wazuh by Juan C. Tello☆14Updated 3 years ago
- A collection of sources of documentation and best practices to build and run a SOC☆42Updated 2 years ago
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆218Updated last year
- Import CrowdStrike Threat Intelligence into your instance of MISP☆42Updated 3 months ago
- ☆86Updated 5 months ago
- A powerful home-lab focused on setting up Splunk SIEM and real-world use cases. If you’re interested to become SOC Analyst(Tier 1/2) , th…☆48Updated 9 months ago
- Run Velociraptor on Security Onion☆37Updated 2 years ago
- A Ruleset to enhance detection capabilities of Ossec using Sysmon☆87Updated 2 years ago
- Newly registered Domain Monitoring to detect phishing and brand impersonation with subdomain enumeration and source code scraping☆47Updated last week
- Repo Filled With Follow Along Guides☆72Updated 2 years ago
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆81Updated last year
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆69Updated 3 months ago
- ☆205Updated 8 months ago
- Docker image for MISP☆122Updated 2 weeks ago
- MISP Playbooks☆182Updated last week