socfortress / SOCFortress-Threat-Intel
Integrate your Wazuh-Manager or Graylog with the SOCFortress Threat Intel Service
☆28Updated 5 months ago
Alternatives and similar repositories for SOCFortress-Threat-Intel:
Users that are interested in SOCFortress-Threat-Intel are comparing it to the libraries listed below
- ☆33Updated last year
- Run Velociraptor on Security Onion☆37Updated 2 years ago
- Wazuh integration TheHive☆35Updated 2 years ago
- Personal scripts☆13Updated 6 months ago
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆85Updated last year
- Security Onion + Automation + Response Lab including n8n and Velociraptor☆107Updated 2 years ago
- A collection of various SIEM rules relating to malware family groups.☆65Updated 9 months ago
- This repository contains Splunk queries to hunt some anomalies☆39Updated 2 years ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆71Updated last year
- Roota is a public-domain language of threat detection and response that combines native queries from a SIEM, EDR, XDR, or Data Lake with …☆122Updated 8 months ago
- ☆31Updated 3 years ago
- ☆15Updated 2 years ago
- Convert Sigma rules to Wazuh rules☆64Updated 11 months ago
- Docker image for Velocidex Velociraptor☆122Updated 2 weeks ago
- Cybersecurity Incident Response Plan☆89Updated 4 years ago
- ☆19Updated 3 years ago
- Useful scripts for those administering Wazuh☆80Updated 2 months ago
- MISP Playbooks☆188Updated last month
- MISP to Sentinel integration☆63Updated 3 months ago
- ☆43Updated last year
- Newly registered Domain Monitoring to detect phishing and brand impersonation with subdomain enumeration and source code scraping☆48Updated last month
- Import CrowdStrike Threat Intelligence into your instance of MISP☆44Updated last week
- CrowdStrike Falcon Queries For Advanced Threat Detection☆16Updated 2 weeks ago
- These are open source rules that can be utilized with QRadar to detect various types of threats in the environment.☆54Updated 5 years ago
- ☆87Updated last month
- Incident Response Methodologies (IRM), also called Incident Playbook, based on the work done by the CERT Societe General☆23Updated 3 years ago
- A collection of tips for using MISP.☆74Updated 3 months ago
- This is the One Stop place where you can several Detection Rules which can help you to kick start your journey on SIEM, SOC work.☆38Updated 3 years ago
- ☆101Updated this week