socfortress / SOCFortress-Threat-Intel
Integrate your Wazuh-Manager or Graylog with the SOCFortress Threat Intel Service
☆29Updated 7 months ago
Alternatives and similar repositories for SOCFortress-Threat-Intel
Users that are interested in SOCFortress-Threat-Intel are comparing it to the libraries listed below
Sorting:
- ☆34Updated last year
- MISP to Sentinel integration☆67Updated last month
- A collection of various SIEM rules relating to malware family groups.☆66Updated 11 months ago
- Run Velociraptor on Security Onion☆37Updated 2 years ago
- Convert Sigma rules to Wazuh rules☆64Updated last year
- ☆19Updated 3 years ago
- Security Onion + Automation + Response Lab including n8n and Velociraptor☆109Updated 2 years ago
- This repository contains various threat hunting tools written in Python and is documented in the series Python Threat Hunting Tools which…☆13Updated last year
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆70Updated last year
- A collection of tips for using MISP.☆74Updated 5 months ago
- Finding ClickFix and FakeCAPTCHA like it's 1999☆36Updated this week
- Docker image for Velocidex Velociraptor☆126Updated 2 months ago
- MISP Playbooks☆200Updated 3 months ago
- Personal scripts☆14Updated 8 months ago
- ☆31Updated 3 years ago
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆156Updated last month
- This repository contains Splunk queries to hunt some anomalies☆42Updated 2 years ago
- Tools for simulating threats☆183Updated last year
- ☆69Updated last month
- ☆103Updated this week
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆87Updated last year
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆88Updated 6 months ago
- Sysmon and wazuh integration with Sigma sysmon rules [updated]☆65Updated 3 years ago
- Online resources related to Detection Engineering. Detection rules, detection logic, attack samples, detection tests and emulation tools…☆93Updated 2 weeks ago
- ☆43Updated 2 years ago
- A production ready Dockered MISP☆233Updated this week
- ☆59Updated 4 years ago
- Awesome Splunk SPL hunt queries that can be used to detect the latest vulnerability exploitation attempts & subsequent compromise☆63Updated last year
- Roota is a public-domain language of threat detection and response that combines native queries from a SIEM, EDR, XDR, or Data Lake with …☆127Updated 9 months ago
- Cybersecurity Incident Response Plan☆91Updated 4 years ago