theflakes / sigma_to_wazuh
Convert Sigma rules to Wazuh rules
☆59Updated 9 months ago
Alternatives and similar repositories for sigma_to_wazuh:
Users that are interested in sigma_to_wazuh are comparing it to the libraries listed below
- A Sigma to Wazuh / OSSEC converter including a generated Windows Sysmon ruleset☆33Updated 4 years ago
- Run Velociraptor on Security Onion☆37Updated 2 years ago
- A Ruleset to enhance detection capabilities of Ossec using Sysmon☆87Updated 2 years ago
- Sysmon and wazuh integration with Sigma sysmon rules [updated]☆62Updated 3 years ago
- Repository for SPEED SIEM Use Case Framework☆52Updated 4 years ago
- A collection of tips for using MISP.☆74Updated last month
- Technical add-on for Splunk related to TheHive/Cortex from TheHive project☆52Updated 2 months ago
- Threat Hunting & Incident Investigation with Osquery☆204Updated 2 years ago
- Import specific data sources into the Sigma generic and open signature format.☆77Updated 2 years ago
- Wazuh integration TheHive☆33Updated last year
- ☆33Updated last year
- ☆31Updated 3 years ago
- SIEGMA - Transform Sigma rules into SIEM consumables☆146Updated last year
- ☆82Updated last week
- Dettectinator - The Python library to your DeTT&CT YAML files.☆107Updated this week
- OSSEM Data Dictionaries☆59Updated 4 months ago
- Threat Hunting with ELK Workshop (InfoSecWorld 2017)☆66Updated 7 years ago
- Fast IOC and YARA Scanner☆75Updated 4 years ago
- Docker image for Velocidex Velociraptor☆115Updated 6 months ago
- SOC Workflow App helps Security Analysts and Threat Hunters explore suspicious events, look into raw events arriving at the Elastic Stack…☆93Updated 2 years ago
- A Splunk App containing Sigma detection rules, which can be updated from a Git repository.☆107Updated 4 years ago
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆51Updated 2 years ago
- This repository is for Indicators of Compromise (IOCs) from Zscaler ThreatLabz public reports☆66Updated last month
- This code snippet retrieves Azure Sentinel rules that are mapped to MITRE ATT&CK Framework and generates the related MITRE D3FEND defense…☆70Updated 3 years ago
- Cerebrate is an open-source platform meant to act as a trusted contact information provider and interconnection orchestrator for other se…☆85Updated last month
- Open Source Platform for storing, organizing, and searching documents related to cyber threats☆159Updated last year
- Repository of public reference frameworks for the DFIR community.☆109Updated last year
- ATT&CK Powered Suit is a browser extension that puts the complete MITRE ATT&CK® knowledge base at your fingertips with text search, conte…☆74Updated 2 months ago
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆115Updated last year