wazuh / wazuh-qaLinks
Wazuh - Quality Assurance
☆66Updated 3 weeks ago
Alternatives and similar repositories for wazuh-qa
Users that are interested in wazuh-qa are comparing it to the libraries listed below
Sorting:
- Wazuh - RESTful API☆74Updated 9 months ago
- Wazuh - Splunk App☆55Updated 9 months ago
- Wazuh - Chef cookbooks☆22Updated last year
- Wazuh - Tools for packages creation☆110Updated 6 months ago
- Wazuh - Puppet module☆49Updated this week
- Tools for Wazuh by Juan C. Tello☆14Updated 3 years ago
- Falcon Integration Gateway (FIG)☆18Updated last month
- Kibana 6 Templates for Suricata IDPS Threat Hunting☆24Updated 6 years ago
- Mapping Corelight or Zeek data to Elastic Common Schema fields☆34Updated this week
- Zeek package for tracking long connections to report them before they have completed.☆30Updated 4 months ago
- ☆54Updated this week
- OSCAL SSP content for technologies shipped by Red Hat☆15Updated 2 years ago
- ☆48Updated 2 weeks ago
- PatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform☆11Updated last year
- Pep up your Windows Event Collector (WEC) for Windows Event Forwarding (WEF)☆19Updated 3 years ago
- ☆17Updated 3 years ago
- DefectDojo Community Content☆18Updated 2 weeks ago
- Parse wazuh[HIDS] alerts into ECS mapping using Filebeat☆27Updated 4 years ago
- Wazuh - Release for Bosh.io☆11Updated last year
- Tools for security content automation, baseline tailoring, and overlay development.☆44Updated 9 months ago
- Landing Page Content/Builder for MITRE Security Automation Framework☆29Updated last week
- Kestrel Jupyter Notebook Kernel☆9Updated last year
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆35Updated 2 years ago
- ☆19Updated 3 years ago
- Protect your Cloud Native Applications running on Kubernetes from malicious attacks with pre-registered source code, pre-registered runti…☆56Updated 6 months ago
- Corelight-Ansible-Roles are a collection of Ansible Roles and playbooks that install, configure, run and manage a variety of Corelight, S…☆16Updated 4 years ago
- Posture Attribute Collection and Evaluation☆23Updated 2 years ago
- CVE Vulnerability scanner of your software bill of materials (SBOM). ASCII text input.☆17Updated 4 years ago
- Automated process to build and distribute Posture & Exposure Reports' bi-weekly to customers.☆17Updated last year
- The Wazuh agent for endpoints.☆71Updated this week