theflakes / StoWLinks
Sigma to Wazuh rule converter
☆10Updated 8 months ago
Alternatives and similar repositories for StoW
Users that are interested in StoW are comparing it to the libraries listed below
Sorting:
- Convert Sigma rules to Wazuh rules☆67Updated last year
- Personal scripts☆14Updated 8 months ago
- Collection of Remote Management Monitoring tool artifacts, for assisting forensics and investigations☆88Updated 10 months ago
- Our collection of Wazuh detection rules for our Offense Lab☆14Updated 3 years ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆70Updated 2 years ago
- Provides an advanced baseline to implement a secure Windows auditing strategy on Windows OS.☆54Updated last week
- ☆72Updated 7 months ago
- A collection of various SIEM rules relating to malware family groups.☆66Updated 11 months ago
- Integrate your Wazuh-Manager or Graylog with the SOCFortress Threat Intel Service☆29Updated 8 months ago
- Domain Response is a tool that is designed to help you automate the investigation for a domain. This tool is specificly designed to autom…☆47Updated last year
- A tool to assess the compliance of a VMware vSphere environment against the CIS Benchmark.☆51Updated 2 years ago
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆51Updated 5 months ago
- Collection of PowerShell functinos and scripts a Blue Teamer might use☆85Updated last year
- Run Velociraptor on Security Onion☆37Updated 2 years ago
- ☆41Updated 2 years ago
- Ansible role for installing Sysmon with popular config files included.☆25Updated 2 years ago
- ☆74Updated 2 months ago
- A PowerShell incident response script for quick triage☆80Updated 2 years ago
- Security Onion + Automation + Response Lab including n8n and Velociraptor☆109Updated 2 years ago
- Powershell module for VMWare vSphere forensics☆152Updated 7 months ago
- VirtualGHOST Detection Tool☆91Updated last year
- ☆65Updated last year
- ☆47Updated last month
- ☆39Updated 2 years ago
- MDE relies on some of the Audit settings to be enabled☆98Updated 2 years ago
- Specific guidance and configuration scripts based on Microsoft-recommended security configuration baselines for Windows.☆13Updated 4 years ago
- pySigma Splunk backend☆38Updated 3 weeks ago
- A list of resources to build a information security team.☆13Updated 4 years ago
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆155Updated 2 months ago
- A collection of tips for using MISP.☆74Updated 5 months ago