Sigma to Wazuh rule converter
☆18Sep 28, 2025Updated 5 months ago
Alternatives and similar repositories for StoW
Users that are interested in StoW are comparing it to the libraries listed below
Sorting:
- Our collection of Wazuh detection rules for our Offense Lab☆18Feb 13, 2022Updated 4 years ago
- ☆20Jan 20, 2023Updated 3 years ago
- One Day of Python for SaintCon 2022☆11Jan 3, 2023Updated 3 years ago
- Self‑hosted strength‑training analytics for Strong app exports. Import your CSV, see PRs, volume trends, rep ranges, and workout history …☆24Nov 11, 2025Updated 3 months ago
- A10’s ARM templates for Azure cloud☆11Sep 29, 2023Updated 2 years ago
- The dataset was used as a support to attack obfuscations. It is the largest obfuscated dataset, with realistic and various binaries and f…☆19Jan 15, 2026Updated last month
- Ansible Collection☆12Apr 22, 2025Updated 10 months ago
- This is a script to import Cisco Talos's IP Blacklist into a Tag (Host Group) within Stealthwatch. This will also optionally create a Cu…☆11May 22, 2023Updated 2 years ago
- The All In One Script!☆10Feb 12, 2020Updated 6 years ago
- This is a fork from Ryan Carson's AI Dev Tasks repository, with some code cleanup and refactoring to enable support for PostgreSQL databa…☆15Sep 8, 2025Updated 5 months ago
- The Eureka Lab Series is designed for learners at all levels of experience and interest in security concepts and technologies.☆10Nov 30, 2025Updated 3 months ago
- The original version of Firefox for GNS3 is completely outdated, so I made a new version with the latest update☆11Feb 14, 2025Updated last year
- ☆27Updated this week
- Queries from the blog posts.☆15Oct 6, 2024Updated last year
- 🚀 Smallest event emitter for JavaScript with all the power of ES6 Maps!☆11Jul 25, 2019Updated 6 years ago
- Sample data generator for the Splunk for Palo Alto Networks app.☆12Sep 25, 2016Updated 9 years ago
- In this projects are custom-decoders and custom-rules for Wazuh by me. Feel free to use it, you can redistribute it and/or modify it unde…☆59Dec 19, 2025Updated 2 months ago
- ☆41Aug 26, 2023Updated 2 years ago
- Tools for hunting security threats☆12Feb 4, 2020Updated 6 years ago
- Use column formatting json to customize SharePoint online columns☆11Nov 13, 2017Updated 8 years ago
- Smart weather dashboard. Integrates with OpenWeatherMaps and Ecobee. Designed to run on RaspberryPi.☆15Aug 19, 2023Updated 2 years ago
- ☆10May 6, 2023Updated 2 years ago
- Automating the creation and locking of AD users and groups☆11Dec 6, 2022Updated 3 years ago
- Tailscale System(d) (bootable) container for use with Podman Machine, Podman Desktop, MicroShift and OpenShift Local installations☆12Dec 30, 2024Updated last year
- Ansible playbook to convert Sigma rules to ElastAlert rules☆10Feb 5, 2021Updated 5 years ago
- Draugnet is a lightweight, open-source tool for anonymous cyber threat reporting. Built for the MISP ecosystem, it lets users submit and …☆20Updated this week
- GUI for regripper☆11Mar 19, 2019Updated 6 years ago
- Offline Active Directory Domain Services (AD DS) Join☆12Jan 4, 2017Updated 9 years ago
- HoneyDB Python Module☆14Feb 6, 2024Updated 2 years ago
- go client for the wazuh rest api☆12Nov 1, 2025Updated 4 months ago
- ☆16Updated this week
- Project to Support The Hunter's Framework (THF)☆11Apr 16, 2024Updated last year
- UCS@school☆17Feb 16, 2026Updated 2 weeks ago
- Free UWP web browser app.☆10Jan 10, 2026Updated last month
- Diese Ablage ist die strukturierte Wissensdatenbank der Mint System GmbH.☆13Updated this week
- 🦉🔬A small PowerShell tool for finding information quickly on malicious IPs or FQDNs. Powershell threat hunting.☆11Jan 9, 2020Updated 6 years ago
- In this project, I am creating a facial mesh using opencv and mediapipe. It can detect a face even with a face mask.☆13Sep 13, 2021Updated 4 years ago
- ☆12Jan 17, 2026Updated last month
- Technical cyber security resources across the NIST cyber security framework lifecycle☆11Apr 28, 2021Updated 4 years ago