yevonnaelandrew / t-guard
T-Guard Repository
☆13Updated last year
Alternatives and similar repositories for t-guard
Users that are interested in t-guard are comparing it to the libraries listed below
Sorting:
- Integrate your Wazuh-Manager or Graylog with the SOCFortress Threat Intel Service☆29Updated 7 months ago
- Useful scripts for those administering Wazuh☆83Updated this week
- ☆34Updated last year
- Open Source SIEM Stack☆88Updated 2 months ago
- (Unofficial) Wazuh integration to send alerts to IRIS.☆17Updated 4 months ago
- ☆17Updated 2 years ago
- A powerful home-lab focused on setting up Splunk SIEM and real-world use cases. If you’re interested to become SOC Analyst(Tier 1/2) , th…☆52Updated last year
- Cybether - A modern, open-source Cybersecurity Governance, Risk, and Compliance (GRC) dashboard☆78Updated 2 months ago
- ☆210Updated last year
- Security Onion + Automation + Response Lab including n8n and Velociraptor☆109Updated 2 years ago
- ☆31Updated 3 years ago
- Advanced Wazuh Rules for more accurate threat detection. Feel free to implement within your own Wazuh environment, contribute, or fork!☆12Updated 2 years ago
- OpenCTI–Wazuh connector looking for indicators in Wazuh and creating sightings☆17Updated 9 months ago
- ☆27Updated last year
- Configurations to implement Wazuh☆11Updated 2 years ago
- Personal scripts☆14Updated 8 months ago
- Splunk add-on related to the PurpleLab tool☆39Updated last year
- Wazuh integration TheHive☆35Updated 2 years ago
- ☆18Updated last year
- A collection of various SIEM rules relating to malware family groups.☆66Updated 10 months ago
- On-Premises Open Cyber Threat Intelligence Platform☆11Updated 6 months ago
- SOCFortress CoPilot☆275Updated this week
- MISP to Sentinel integration☆67Updated last month
- Run Velociraptor on Security Onion☆37Updated 2 years ago
- OpenBAS Docker deployment helpers☆18Updated this week
- Protect your data in minutes !☆118Updated 6 months ago
- Docker image for Velocidex Velociraptor☆126Updated 2 months ago
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆156Updated last month
- A collection of sources of documentation and best practices to build and run a SOC☆53Updated 2 years ago
- Repository resource for threat hunter☆158Updated 6 years ago