wazuh / wazuh-indexerLinks
Wazuh indexer, the Wazuh search engine
☆22Updated this week
Alternatives and similar repositories for wazuh-indexer
Users that are interested in wazuh-indexer are comparing it to the libraries listed below
Sorting:
- The Wazuh agent for endpoints.☆90Updated 5 months ago
- OCA-wide documentation shared by all sub-projects and repositories☆33Updated last year
- The official Prelude SIEM GitHub of https://www.prelude-siem.org☆34Updated 9 years ago
- Scripts to deploy and update MISP in air-gapped environments☆16Updated last month
- Wazuh - Tools for packages creation☆113Updated last year
- ☆27Updated 4 months ago
- Global Security Database Tools☆43Updated 2 years ago
- Growing collection of Spicy-based protocol and file analyzers for Zeek☆31Updated last year
- Sagan is a multi-threads, high performance log analysis engine. At it's core, Sagan similar to Suricata/Snort but with logs rather th…☆190Updated 2 months ago
- A repository for OSSEC rules and decoders☆54Updated 2 years ago
- Wazuh dashboard, the Wazuh UI platform☆59Updated last week
- A real-time Grafana dashboard using MISP ZeroMQ message queue and InfluxDB☆18Updated last year
- EPSS(Exploit Prediction Scoring System) API client☆19Updated last month
- THOR APT Scanner User Manual☆20Updated last week
- Falcon Integration Gateway (FIG)☆21Updated 2 weeks ago
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆67Updated last year
- Wazuh - Quality Assurance☆67Updated last month
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆38Updated 3 years ago
- Caldera plugin to deploy "humans" to emulate user behavior on systems☆29Updated last year
- Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions☆104Updated this week
- Lua plugin to extract data from Wireshark and convert it into MISP format☆49Updated 2 years ago
- Decision trees generated via Graphviz to inform pragmatic threat modelling.☆11Updated 4 years ago
- Example Suricata rules implementing some of my detection tactics☆22Updated 2 years ago
- Information relating to the governance of the Open Cybersecurity Alliance (OCA) OASIS Open Project. https://github.com/opencybersecuritya…☆29Updated last month
- OASIS Cyber Threat Intelligence (CTI) TC: A tool for generating STIX content for prototyping and testing. https://github.com/oasis-open/c…☆42Updated last year
- Pattern recognition for hosts, services, and content☆14Updated 3 years ago
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆40Updated this week
- Decryption utility for PGP Whole Disk Encryption☆20Updated 4 years ago
- CloudSpec is an open source tool for validating your resources in your cloud providers using a logical language.☆26Updated 3 years ago
- VINCE is the Vulnerability Information and Coordination Environment developed and used by the CERT Coordination Center to improve coordin…☆85Updated 2 weeks ago