theflakes / StoWLinks
Sigma to Wazuh rule converter
☆17Updated last month
Alternatives and similar repositories for StoW
Users that are interested in StoW are comparing it to the libraries listed below
Sorting:
- Integrate your Wazuh-Manager or Graylog with the SOCFortress Threat Intel Service☆31Updated last year
- Personal scripts☆15Updated last year
- Security Onion + Automation + Response Lab including n8n and Velociraptor☆112Updated 3 years ago
- Convert Sigma rules to Wazuh rules☆73Updated 2 months ago
- Sysmon and wazuh integration with Sigma sysmon rules [updated]☆70Updated 4 years ago
- Automation tool for Windows Deception Host Burn-In☆86Updated 11 months ago
- Playbook-NG is a stateless web-based application used to match incident findings with countermeasures for adversary containment and evict…☆152Updated last month
- ☆96Updated 3 weeks ago
- Provides an advanced baseline to implement a secure Windows auditing strategy on Windows OS.☆57Updated 5 months ago
- ☆19Updated 4 years ago
- Useful scripts for those administering Wazuh☆88Updated last week
- ☆17Updated 4 years ago
- ☆39Updated 2 years ago
- ☆88Updated 8 months ago
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆53Updated 3 weeks ago
- Repo to hold wazuh manager mcp server☆65Updated last month
- Roota is a public-domain language of threat detection and response that combines native queries from a SIEM, EDR, XDR, or Data Lake with …☆132Updated last year
- Collection of Remote Management Monitoring tool artifacts, for assisting forensics and investigations☆99Updated 3 months ago
- DShield Sensor Log Collection with ELK☆43Updated this week
- VirtualGHOST Detection Tool☆97Updated last year
- A collection of various SIEM rules relating to malware family groups.☆70Updated last year
- ☆21Updated this week
- Import CrowdStrike Threat Intelligence into your instance of MISP☆48Updated 5 months ago
- ☆67Updated 2 years ago
- VelociraptorMCP is a Model Context Protocol bridge for exposing LLMs to MCP clients.☆58Updated 3 months ago
- Convert a variety of log formats to CSV while enriching detected IPs with Geolocation, ASN, DNS, WhoIs, Shodan InternetDB and Threat Indi…☆108Updated last year
- ☆19Updated 2 years ago
- ASR Configurator, Essentials and Atomic Testing☆99Updated 7 months ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆49Updated last year
- Docker image for Velocidex Velociraptor☆140Updated 8 months ago