zbalkan / rulevisLinks
RuleVis is a powerful analysis tool that transforms your Wazuh ruleset into a dynamic, interactive force-directed graph. It helps you visualize the complex relationships between rules, identify critical dependencies, discover structural issues, and analyze the distribution of your rule IDs.
☆23Updated 2 months ago
Alternatives and similar repositories for rulevis
Users that are interested in rulevis are comparing it to the libraries listed below
Sorting:
- ☆119Updated 7 months ago
- Cybether - A modern, open-source Cybersecurity Governance, Risk, and Compliance (GRC) dashboard☆85Updated last month
- AI-powered cybersecurity attack flow visualization tool using MITRE ATT&CK☆194Updated last month
- Generate MITRE ATT&CK and D3FEND from a list of CVEs. Database with CVE, CWE, CAPEC, MITRE ATT&CK and D3FEND Techniques data is updated d…☆263Updated this week
- Have you ever wanted to search a link or IP address on multiple OSINT pages at once?☆59Updated 6 months ago
- Mapping of open-source detection rules and atomic tests.☆193Updated last year
- MISP Playbooks☆221Updated 3 months ago
- ThreatSeeker: Threat Hunting via Windows Event Logs☆123Updated 2 years ago
- Scripts for importing threat feeds and CTI articles, blogs, and reports into MISP.☆18Updated 7 months ago
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆115Updated last year
- Jupyter Univere is a search engine for all infosec jupyter notebooks☆34Updated 9 months ago
- Menu for Thor scanner lite☆20Updated 2 months ago
- Sniffing out well-known threat groups☆64Updated last year
- ☆35Updated last year
- ☆219Updated last year
- MISP to Microsoft Defender integration☆15Updated 2 weeks ago
- ☆192Updated last year
- A curated collection of DFIR skills and workflows for InfoSec practitioners.☆214Updated this week
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆162Updated 9 months ago
- ☆96Updated last week
- Playbook-NG is a stateless web-based application used to match incident findings with countermeasures for adversary containment and evict…☆156Updated last month
- A starter pack of resources to help you get started in Detection Engineering.☆180Updated this week
- A curated list of LLM driven Cyber security Resources☆45Updated 3 months ago
- MCP Server for Wazuh SIEM☆164Updated last month
- An automated Adversary Emulation lab with terraform and MCP server. Build Caldera techniques and operations assisted with LLMs. Built f…☆204Updated last month
- A 30-day hands-on SOC Analyst project simulating real-world cyber attacks using ELK Stack, Mythic C2, osTicket & Elastic Defend. Covers t…☆39Updated 7 months ago
- Roota is a public-domain language of threat detection and response that combines native queries from a SIEM, EDR, XDR, or Data Lake with …☆132Updated last year
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆82Updated 9 months ago
- A collection of CVEs weaponized by ransomware operators☆128Updated 3 months ago
- ☆54Updated 2 years ago