OSSEC Documentation
☆139Feb 3, 2026Updated 3 months ago
Alternatives and similar repositories for ossec-docs
Users that are interested in ossec-docs are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- OSSEC website on Github☆25Feb 23, 2021Updated 5 years ago
- OSSEC is an Open Source Host-based Intrusion Detection System that performs log analysis, file integrity checking, policy monitoring, roo…☆5,010Apr 20, 2026Updated 2 weeks ago
- Alienvault ossim☆122Feb 9, 2025Updated last year
- Bro Live! A Bro training/learning environment.☆14Jul 21, 2015Updated 10 years ago
- VirusTotal SIEM Integration and Automation☆18Jan 16, 2017Updated 9 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Cmdlets for capturing Windows Events☆14Mar 11, 2022Updated 4 years ago
- Some yara rules and tools☆16Feb 12, 2014Updated 12 years ago
- A package manager for Zeek☆47Mar 5, 2026Updated last month
- EPSScall☆11Jun 10, 2022Updated 3 years ago
- OpenConext SAML 2.0 IdP/SP Gateway☆17Updated this week
- Linux服务器信息收集脚本☆19Apr 20, 2018Updated 8 years ago
- ☆15Jun 29, 2016Updated 9 years ago
- Minion Frontend☆30Mar 28, 2019Updated 7 years ago
- Passive Real-time Asset Detection System☆250May 28, 2024Updated last year
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Small TEST-ONLY server for mock DNS & responding to HTTP-01, DNS-01, and TLS-ALPN-01 ACME challenges.☆27Feb 11, 2026Updated 2 months ago
- dhcpig : initiates an advanced DHCP exhaustion attack☆61Sep 20, 2015Updated 10 years ago
- Samples of Avatar firmware analysis (including NDSS'14 cases)☆20Jun 27, 2017Updated 8 years ago
- Nohidy the system admins best friend, multi platform auditing tool☆14Feb 6, 2018Updated 8 years ago
- Useful Powershell modules.☆11Mar 10, 2017Updated 9 years ago
- A collection of tools adversaries commonly use in an attack.☆15Nov 23, 2024Updated last year
- A Java library for parsing and programmatically using threat models☆82Feb 15, 2023Updated 3 years ago
- ☆16Mar 10, 2017Updated 9 years ago
- Photo forensics tool that detects alteration of JPEG images☆10May 13, 2021Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Cross platform (i.e., Windows, Linux, Mac) assessment script. The script helps assess workstations for vulnerabilities and abnormalities.☆19Aug 14, 2015Updated 10 years ago
- 互联网企业安全高级指南读书笔记脑图 - http://www.mottoin.com/95816.html & http://www.mottoin.com/95828.html Author:hblf@MottoIN Team☆41Feb 20, 2017Updated 9 years ago
- sAoccec something about ossec☆17Apr 27, 2013Updated 13 years ago
- Bash script to download all lecture videos & notes for a particular course on Coursera.org.☆13Dec 25, 2015Updated 10 years ago
- A Bash script which uses AWS CLI to create an image of an AWS EC2 volume☆29Jan 1, 2024Updated 2 years ago
- This role installs and configures ProxySQL - the high performance, high availability, protocol aware proxy for MySQL.☆16Mar 31, 2026Updated last month
- The OpenFISMA project is an open source application designed to reduce the complexity and automate the regulatory requirements of the Fed…☆10Apr 21, 2015Updated 11 years ago
- Webhook Authentication for kube-apiserver☆10Apr 1, 2026Updated last month
- Cloud Trust Protocol Server☆11Jan 5, 2016Updated 10 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆86Aug 11, 2023Updated 2 years ago
- ☆142May 24, 2024Updated last year
- Source code of IronWASP☆115Sep 20, 2013Updated 12 years ago
- some info about ops security(system, network, etc)☆28Aug 11, 2015Updated 10 years ago
- Script to perform Linux Memory Diff Analysis Using Volatility☆24Sep 20, 2015Updated 10 years ago
- Set of extra commands for kippo, the SSH honeypot daemon☆30Nov 15, 2015Updated 10 years ago
- ☆15Apr 9, 2018Updated 8 years ago