socfortress / Wazuh-RulesLinks
Advanced Wazuh Rules for more accurate threat detection. Feel free to implement within your own Wazuh environment, contribute, or fork!
☆856Updated 3 weeks ago
Alternatives and similar repositories for Wazuh-Rules
Users that are interested in Wazuh-Rules are comparing it to the libraries listed below
Sorting:
- SOCFortress CoPilot☆346Updated this week
- Playbooks for SOC Analysts☆579Updated 2 years ago
- Collaborative Incident Response platform☆1,246Updated last week
- Awesome Security lists for SOC/CERT/CTI☆1,091Updated this week
- This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. Contains multiple…☆701Updated 7 months ago
- A production ready Dockered MISP☆270Updated last week
- This is a Project Designed for Security Analysts and all SOC audiences who wants to play with implementation and explore the Modern SOC a…☆684Updated 11 months ago
- This project is a SIEM with SIRP and Threat Intel, all in one.☆460Updated 9 months ago
- PowerShell Digital Forensics & Incident Response Scripts.☆684Updated last month
- ☆217Updated last year
- MasterParser is a powerful DFIR tool designed for analyzing and parsing Linux logs☆741Updated 2 weeks ago
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆709Updated 3 weeks ago
- Incident Response Methodologies 2022☆1,068Updated 4 months ago
- ⚡️ Catalyst is a self-hosted, open source incident response platform and ticket system that helps to automate alert handling and incident…☆424Updated last month
- Incident Response Documentation made easy. Developed by Incident Responders for Incident Responders☆937Updated last year
- A website and framework for testing NIDS detection☆280Updated last month
- This project aims to compare and evaluate the telemetry of various EDR products.☆1,827Updated last week
- A web application that assists network defenders, analysts, and researchers in the process of mapping adversary behaviors to the MITRE AT…☆1,194Updated 2 months ago
- Awesome list of keywords and artifacts for Threat Hunting sessions☆599Updated 3 weeks ago
- SIEM Tactics, Techiques, and Procedures☆659Updated 3 weeks ago
- Documentation and scripts to properly enable Windows event logs.☆626Updated last year
- A concise, directive, specific, flexible, and free incident response plan template☆728Updated last year
- ☆161Updated 10 months ago
- A collection of sources of documentation, as well as field best practices, to build/run a SOC☆1,480Updated 3 weeks ago
- Practical Windows Forensics Training☆683Updated last year
- OpenCTI Connectors☆469Updated this week
- UAC is a powerful and extensible incident response tool designed for forensic investigators, security analysts, and IT professionals. It …☆1,071Updated 2 weeks ago
- practical toolkit for cybersecurity and IT professionals. It features a detailed Linux cheatsheet for incident response☆399Updated last year
- Open Adversary Exposure Validation Platform☆1,345Updated last week
- Open Source SIEM Stack☆109Updated last month