theflakes / sigma_to_wazuh
Convert Sigma rules to Wazuh rules
☆64Updated last year
Alternatives and similar repositories for sigma_to_wazuh:
Users that are interested in sigma_to_wazuh are comparing it to the libraries listed below
- A Ruleset to enhance detection capabilities of Ossec using Sysmon☆92Updated 3 years ago
- A Sigma to Wazuh / OSSEC converter including a generated Windows Sysmon ruleset☆33Updated 4 years ago
- SIEGMA - Transform Sigma rules into SIEM consumables☆149Updated last month
- Wazuh integration TheHive☆35Updated 2 years ago
- A collection of tips for using MISP.☆74Updated 4 months ago
- Technical add-on for Splunk related to TheHive/Cortex from TheHive project☆53Updated this week
- Anything Sysmon related from the MSTIC R&D team☆152Updated 10 months ago
- A curated list of awesome things related to TheHive & Cortex☆178Updated 3 years ago
- Threat Detection & Anomaly Detection rules for popular open-source components☆51Updated 2 years ago
- Open Source Platform for storing, organizing, and searching documents related to cyber threats☆164Updated last year
- Sysmon and wazuh integration with Sigma sysmon rules [updated]☆65Updated 3 years ago
- Dettectinator - The Python library to your DeTT&CT YAML files.☆111Updated last week
- This repository is for Indicators of Compromise (IOCs) from Zscaler ThreatLabz public reports☆72Updated 5 months ago
- ☆19Updated 3 years ago
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆201Updated 2 years ago
- Run Velociraptor on Security Onion☆37Updated 2 years ago
- Docker image for MISP☆125Updated 3 weeks ago
- A Splunk App containing Sigma detection rules, which can be updated from a Git repository.☆108Updated 5 years ago
- ☆31Updated 3 years ago
- Repository for SPEED SIEM Use Case Framework☆53Updated 4 years ago
- SOC Workflow App helps Security Analysts and Threat Hunters explore suspicious events, look into raw events arriving at the Elastic Stack…☆94Updated 2 years ago
- Cerebrate is an open-source platform meant to act as a trusted contact information provider and interconnection orchestrator for other se…☆88Updated 2 weeks ago
- Roota is a public-domain language of threat detection and response that combines native queries from a SIEM, EDR, XDR, or Data Lake with …☆126Updated 9 months ago
- Threat Hunting & Incident Investigation with Osquery☆207Updated 3 years ago
- Rules generated from our investigations.☆194Updated 3 weeks ago
- S2AN - Mapper of Sigma/Suricata Rules/Signatures ➡️ MITRE ATT&CK Navigator☆85Updated 2 years ago
- Awesome Splunk SPL hunt queries that can be used to detect the latest vulnerability exploitation attempts & subsequent compromise☆61Updated 11 months ago
- ☆33Updated last year
- These are open source rules that can be utilized with QRadar to detect various types of threats in the environment.☆54Updated 5 years ago
- ☆68Updated last month