All Projects → Wazuh Ruleset → Similar Projects or Alternatives

1550 Open source projects that are alternatives of or similar to Wazuh Ruleset

Wazuh
Wazuh - The Open Source Security Platform
Stars: ✭ 3,154 (+934.1%)
wazuh-ansible
Wazuh - Ansible playbook
Stars: ✭ 166 (-45.57%)
wazuh-packages
Wazuh - Tools for packages creation
Stars: ✭ 54 (-82.3%)
wazuh-puppet
Wazuh - Puppet module
Stars: ✭ 25 (-91.8%)
wazuh-cloudformation
Wazuh - Amazon AWS Cloudformation
Stars: ✭ 32 (-89.51%)
Siac
SIAC is an enterprise SIEM built on open-source technology.
Stars: ✭ 100 (-67.21%)
Lynis
Lynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and system hardening. Agentless, and installation optional.
Stars: ✭ 9,137 (+2895.74%)
Fail2ban
Daemon to ban hosts that cause multiple authentication errors
Stars: ✭ 6,677 (+2089.18%)
Mutual labels:  ids, monitoring, intrusion-detection
Sigma
Generic Signature Format for SIEM Systems
Stars: ✭ 4,418 (+1348.52%)
Mutual labels:  ids, elasticsearch, monitoring
Content
Security automation content in SCAP, OSCAL, Bash, Ansible, and other formats
Stars: ✭ 1,219 (+299.67%)
Ossec Hids
OSSEC is an Open Source Host-based Intrusion Detection System that performs log analysis, file integrity checking, policy monitoring, rootkit detection, real-time alerting and active response.
Stars: ✭ 3,580 (+1073.77%)
Patrowlmanager
PatrOwl - Open Source, Smart and Scalable Security Operations Orchestration Platform
Stars: ✭ 363 (+19.02%)
Patrowldocs
PatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform
Stars: ✭ 105 (-65.57%)
Information Security Tasks
This repository is created only for infosec professionals whom work day to day basis to equip ourself with uptodate skillset, We can daily contribute daily one hour for day to day tasks and work on problem statements daily, Please contribute by providing problem statements and solutions
Stars: ✭ 108 (-64.59%)
Mutual labels:  incident-response, compliance
Flightsim
A utility to generate malicious network traffic and evaluate controls
Stars: ✭ 525 (+72.13%)
Mutual labels:  monitoring, intrusion-detection
Patrowlengines
PatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform
Stars: ✭ 162 (-46.89%)
Awesome Sre
A curated list of Site Reliability and Production Engineering resources.
Stars: ✭ 7,687 (+2420.33%)
Mutual labels:  monitoring, incident-response
Nfr
A lightweight tool to score network traffic and flag anomalies
Stars: ✭ 104 (-65.9%)
Mutual labels:  monitoring, intrusion-detection
Heroic
The Heroic Time Series Database
Stars: ✭ 836 (+174.1%)
Mutual labels:  elasticsearch, monitoring
Openwisp Monitoring
Network monitoring system written in Python and Django, designed to be extensible, programmable, scalable and easy to use by end users: once the system is configured, monitoring checks, alerts and metric collection happens automatically.
Stars: ✭ 37 (-87.87%)
Mutual labels:  elasticsearch, monitoring
Graylog Plugin Metrics Reporter
Graylog Metrics Reporter Plugins
Stars: ✭ 71 (-76.72%)
Mutual labels:  elasticsearch, monitoring
Redelk
Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability in long term operations.
Stars: ✭ 1,692 (+454.75%)
Mutual labels:  elasticsearch, monitoring
Osquery Extensions
osquery extensions by Trail of Bits
Stars: ✭ 180 (-40.98%)
Mutual labels:  monitoring, intrusion-detection
Homer App
HOMER 7.x Front-End and API Server
Stars: ✭ 88 (-71.15%)
Mutual labels:  elasticsearch, monitoring
Dashbuilder
Dashboard composition tooling based on the Uberfire framework
Stars: ✭ 163 (-46.56%)
Mutual labels:  elasticsearch, monitoring
Alertmanager2es
Receives HTTP webhook notifications from AlertManager and inserts them into an Elasticsearch index for searching and analysis
Stars: ✭ 173 (-43.28%)
Mutual labels:  elasticsearch, monitoring
Vuls
Agent-less vulnerability scanner for Linux, FreeBSD, Container, WordPress, Programming language libraries, Network devices
Stars: ✭ 8,844 (+2799.67%)
Howtheysre
A curated collection of publicly available resources on how technology and tech-savvy organizations around the world practice Site Reliability Engineering (SRE)
Stars: ✭ 6,962 (+2182.62%)
Mutual labels:  monitoring, incident-response
Osquery
SQL powered operating system instrumentation, monitoring, and analytics.
Stars: ✭ 18,475 (+5957.38%)
Mutual labels:  monitoring, intrusion-detection
Osql Experimental
A community-oriented fork of osquery with support for cmake, public CI testing, and regular releases
Stars: ✭ 62 (-79.67%)
Mutual labels:  monitoring, intrusion-detection
Marsnake
System Optimizer and Monitoring, Security Auditing, Vulnerability scanner for Linux, macOS, and UNIX-based systems
Stars: ✭ 16 (-94.75%)
Elasticsearch Hq
Monitoring and Management Web Application for ElasticSearch instances and clusters.
Stars: ✭ 4,832 (+1484.26%)
Mutual labels:  elasticsearch, monitoring
Opserver
Stack Exchange's Monitoring System
Stars: ✭ 4,126 (+1252.79%)
Mutual labels:  elasticsearch, monitoring
Homer7 Docker
HOMER 7 Docker Images
Stars: ✭ 47 (-84.59%)
Mutual labels:  elasticsearch, monitoring
Awesome Monitoring
INFRASTRUCTURE、OPERATION SYSTEM and APPLICATION monitoring tools for Operations.
Stars: ✭ 356 (+16.72%)
Mutual labels:  elasticsearch, monitoring
Grafana
The open and composable observability and data visualization platform. Visualize metrics, logs, and traces from multiple sources like Prometheus, Loki, Elasticsearch, InfluxDB, Postgres and many more.
Stars: ✭ 45,930 (+14959.02%)
Mutual labels:  elasticsearch, monitoring
Es Stats
ElasticSearch cluster metrics -> Graphite
Stars: ✭ 91 (-70.16%)
Mutual labels:  elasticsearch, monitoring
Exceptionless
Exceptionless server and jobs
Stars: ✭ 2,107 (+590.82%)
Mutual labels:  elasticsearch, monitoring
Prowler
Prowler is a security tool to perform AWS security best practices assessments, audits, incident response, continuous monitoring, hardening and forensics readiness. It contains more than 200 controls covering CIS, ISO27001, GDPR, HIPAA, SOC2, ENS and other security frameworks.
Stars: ✭ 4,561 (+1395.41%)
Mutual labels:  security-hardening, compliance
Teler
Real-time HTTP Intrusion Detection
Stars: ✭ 1,248 (+309.18%)
Mutual labels:  ids, intrusion-detection
Selks
A Suricata based IDS/IPS distro
Stars: ✭ 707 (+131.8%)
Mutual labels:  ids, monitoring
Docker Bro
Bro IDS Dockerfile
Stars: ✭ 126 (-58.69%)
Mutual labels:  ids, elasticsearch
Snort Rules
An UNOFFICIAL Git Repository of Snort Rules(IDS rules) Releases.
Stars: ✭ 135 (-55.74%)
Mutual labels:  ids, intrusion-detection
Hastic Server
Hastic data management server for analyzing patterns and anomalies from Grafana
Stars: ✭ 292 (-4.26%)
Mutual labels:  elasticsearch, monitoring
Pi.alert
WIFI / LAN intruder detector. Check the devices connected and alert you with unknown devices. It also warns of the disconnection of "always connected" devices
Stars: ✭ 209 (-31.48%)
Mutual labels:  ids, intrusion-detection
Security Onion
Security Onion 16.04 - Linux distro for threat hunting, enterprise security monitoring, and log management
Stars: ✭ 2,956 (+869.18%)
Mutual labels:  ids, intrusion-detection
Py Idstools
idstools: Snort and Suricata Rule and Event Utilities in Python (Including a Rule Update Tool)
Stars: ✭ 205 (-32.79%)
Mutual labels:  ids, intrusion-detection
prowler
Prowler is an Open Source Security tool for AWS, Azure and GCP to perform Cloud Security best practices assessments, audits, incident response, compliance, continuous monitoring, hardening and forensics readiness. It contains hundreds of controls covering CIS, PCI-DSS, ISO27001, GDPR, HIPAA, FFIEC, SOC2, AWS FTR, ENS and custom security frameworks.
Stars: ✭ 8,046 (+2538.03%)
Mutual labels:  compliance, security-hardening
TheBriarPatch
An extremely crude, lightweight Web Frontend for Suricata/Bro to be used with BriarIDS
Stars: ✭ 21 (-93.11%)
Mutual labels:  ids, intrusion-detection
NIDS-Intrusion-Detection
Simple Implementation of Network Intrusion Detection System. KddCup'99 Data set is used for this project. kdd_cup_10_percent is used for training test. correct set is used for test. PCA is used for dimension reduction. SVM and KNN supervised algorithms are the classification algorithms of project. Accuracy : %83.5 For SVM , %80 For KNN
Stars: ✭ 45 (-85.25%)
Mutual labels:  ids, intrusion-detection
Psad
psad: Intrusion Detection and Log Analysis with iptables
Stars: ✭ 298 (-2.3%)
Pci Paas Webapp Ase Sqldb Appgateway Keyvault Oms
Azure PCI PaaS Reference Architecture
Stars: ✭ 36 (-88.2%)
Mutual labels:  compliance, pci-dss
Immudb
immudb - world’s fastest immutable database, built on a zero trust model
Stars: ✭ 3,743 (+1127.21%)
Mutual labels:  compliance, pci-dss
Electriceye
Continuously monitor your AWS services for configurations that can lead to degradation of confidentiality, integrity or availability. All results will be sent to Security Hub for further aggregation and analysis.
Stars: ✭ 255 (-16.39%)
Mutual labels:  monitoring, security-hardening
lunasec
LunaSec - Dependency Security Scanner that automatically notifies you about vulnerabilities like Log4Shell or node-ipc in your Pull Requests and Builds. Protect yourself in 30 seconds with the LunaTrace GitHub App: https://github.com/marketplace/lunatrace-by-lunasec/
Stars: ✭ 1,261 (+313.44%)
Mutual labels:  pci-dss, compliance
bsmtrace
BSM based intrusion detection system
Stars: ✭ 31 (-89.84%)
Mutual labels:  ids, intrusion-detection
1-60 of 1550 similar projects