A repository for OSSEC rules and decoders
☆55Aug 9, 2023Updated 2 years ago
Alternatives and similar repositories for ossec-rules
Users that are interested in ossec-rules are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- sAoccec something about ossec☆17Apr 27, 2013Updated 12 years ago
- Your Open-Source SOC Assistant☆12Apr 5, 2023Updated 2 years ago
- OSSEC is an Open Source Host-based Intrusion Detection System that performs log analysis, file integrity checking, policy monitoring, roo…☆5,027Mar 14, 2026Updated last week
- DSL language to write seccomp filters☆37Apr 5, 2024Updated last year
- Wazuh - Ruleset☆509Sep 19, 2024Updated last year
- Single sign-on using SSH key pairs and fine-grained remote command authorization☆15Mar 15, 2024Updated 2 years ago
- Rust crate for fetching active mounts and swaps on a Linux system☆17Oct 23, 2025Updated 5 months ago
- Check IOC provided by a MISP instance on Suricata events☆18Jun 4, 2019Updated 6 years ago
- Sparty - MS Sharepoint and Frontpage Auditing Tool☆32Aug 4, 2014Updated 11 years ago
- Scan IPv4 prefixes for DNS revolvers and classify them as open/closed☆10Jun 19, 2014Updated 11 years ago
- Repo for Automations and other solutions for Elastic SIEM/Security.☆18Jun 15, 2021Updated 4 years ago
- Created by Denis Podgurskiy via the GitHub Connector☆13May 20, 2021Updated 4 years ago
- Windows system repair tool☆18Jun 2, 2021Updated 4 years ago
- Learning volatility plugins.☆19Feb 16, 2021Updated 5 years ago
- Zero Wine Tryouts: An open source malware analysis tool☆17Jun 7, 2016Updated 9 years ago
- TPM 2.0 emulator☆10May 6, 2020Updated 5 years ago
- Legal, procedural and policies document templates for operating MISP and information sharing communities☆38Jan 31, 2023Updated 3 years ago
- A list of web application security☆15Dec 26, 2019Updated 6 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆31Jul 19, 2024Updated last year
- Spring Boot 样板项目(使用 Java 与 Maven)☆10May 12, 2022Updated 3 years ago
- The Fastest way to consume Threat Intel☆26Apr 30, 2022Updated 3 years ago
- Prompts, resources, demos, and everything☆23Dec 10, 2022Updated 3 years ago
- Proof-of-Concept python script that implements DNS spoofing attack in Kubernetes environment from a pod located on a Worker server☆15Feb 4, 2021Updated 5 years ago
- A multi-processed, multi-threaded scanner to discover web directories on multiple URLs.☆21Nov 15, 2019Updated 6 years ago
- PenText system: Easily create beautiful looking penetration test quotes, reports, and documents in many formats (PDF, text, JSON, CSV, ..…☆132Updated this week
- Desktop app for Plesk servers management.☆15Apr 18, 2017Updated 8 years ago
- Solutions to the RPISEC MBE / Modern Binary Exploitation VM & course.☆22Feb 5, 2017Updated 9 years ago
- building blocks for tor project websites☆16Oct 14, 2025Updated 5 months ago
- Unix Systems Programming: Communication, Concurrency, and Threads☆12Apr 19, 2019Updated 6 years ago
- A repository for development of the TAXII Specifications. For official releases, please see http://taxiiproject.github.io/releases/☆41Nov 29, 2015Updated 10 years ago
- ☆30Nov 15, 2018Updated 7 years ago
- Logstash output plugin for pulsar☆12Jun 8, 2023Updated 2 years ago
- ☆47Aug 20, 2018Updated 7 years ago
- ☆13Apr 6, 2016Updated 9 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sys…☆12Apr 13, 2017Updated 8 years ago
- Windows File Enumeration Intel Gathering Tool.☆17Sep 4, 2023Updated 2 years ago
- WigleAPI-JSON in PHP with JSON Response☆14Nov 18, 2013Updated 12 years ago
- Magic ring buffer☆22Sep 23, 2016Updated 9 years ago
- A script to analyze geographic GSuite Login activity☆10Sep 3, 2017Updated 8 years ago