wazuh / wazuh-rulesetLinks
Wazuh - Ruleset
☆492Updated last year
Alternatives and similar repositories for wazuh-ruleset
Users that are interested in wazuh-ruleset are comparing it to the libraries listed below
Sorting:
- Wazuh - Project documentation☆229Updated this week
- Plugins for Wazuh Dashboard☆485Updated this week
- Scirius is a web application for Suricata ruleset management and threat hunting.☆668Updated 2 months ago
- Create actionable data from your Vulnerability Scans☆1,396Updated 2 years ago
- Security event correlation engine for ELK stack☆447Updated last year
- Mapping the MITRE ATT&CK Matrix with Osquery☆803Updated 2 years ago
- Documentation of TheHive☆401Updated 2 years ago
- A repository for using osquery for incident detection and response☆869Updated 2 months ago
- Phantom Community Playbooks☆520Updated 3 weeks ago
- IntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol.☆1,099Updated 3 weeks ago
- Web Based Event Viewer (GUI) for Suricata EVE Events in Elastic Search☆472Updated 2 weeks ago
- Suricata IDS/IPS log analytics using the Elastic Stack.☆240Updated 4 years ago
- Cortex Analyzers Repository☆470Updated 3 weeks ago
- The tool for updating your Suricata rules.☆283Updated last month
- Wazuh - RESTful API☆76Updated last year
- MISP Docker (XME edition)☆283Updated last year
- A curated Cyber "Security Orchestration, Automation and Response (SOAR)" awesome list.☆901Updated last year
- Open Source Security Events Metadata (OSSEM)☆1,284Updated 2 years ago
- Documentation of Cortex☆175Updated 2 years ago
- Python library using the MISP Rest API☆476Updated this week
- Suricata, Snort and Zeek IDS rule and pcap testing system☆505Updated 2 months ago
- Actionable analytics designed to combat threats☆1,005Updated 3 years ago
- Configuration files for the SOF-ELK VM☆1,698Updated last week
- Cortex: a Powerful Observable Analysis and Active Response Engine☆1,512Updated last week
- Cyber Analytics Repository☆968Updated 6 months ago
- A Splunk app mapped to MITRE ATT&CK to guide your threat hunts☆1,171Updated 2 years ago
- A Linux Auditd rule set mapped to MITRE's Attack Framework☆815Updated 5 years ago
- Python API Client for TheHive☆234Updated last week
- A set of Zeek scripts to detect ATT&CK techniques.☆617Updated last year
- Automated deployment scripts for the RockNSM network hunting distribution.☆456Updated 2 years ago