2022-08-14 19:51:01 -07:00
2022-08-08 16:43:15 -05:00
2022-08-08 16:40:36 -05:00
2022-08-08 16:29:24 -05:00
2022-08-08 16:22:51 -05:00
2022-08-08 09:37:29 -05:00
2022-08-08 16:25:43 -05:00
2022-08-08 16:12:33 -05:00
2022-08-08 16:12:43 -05:00
2022-08-08 16:51:04 -05:00
2022-08-08 16:18:50 -05:00
2022-08-08 16:45:24 -05:00
2022-08-14 19:51:01 -07:00
2022-08-08 16:12:53 -05:00
2022-08-08 16:49:34 -05:00
2022-08-08 16:13:04 -05:00
2022-08-08 16:58:22 -05:00
2022-08-08 22:22:39 -05:00
2022-08-08 22:06:03 -05:00
2022-08-08 22:08:36 -05:00
2022-08-08 16:13:15 -05:00
2022-08-08 22:36:43 -05:00
2022-08-08 09:15:27 -05:00

SOCFortress Wazuh-Rules N|Solid N|Solid N|Solid

logo_website (1)

Have Wazuh deployed and ingesting your logs but looking for some better detection rules? Look no further. The objective for this repo is to provide the Wazuh community with rulesets that are more accurate, descriptive, and enriched from various sources and integrations.

FEEL FREE TO MERGE REQUEST ANY RULES THAT YOU THINK THE COMMUNITY COULD BENEFIT FROM

Categories of various tools that this repo containes rules for are below

  • Sysmon for Windows
  • Sysmon for Linux
  • Office365
  • Microsoft Defender
  • Sophos
  • MISP
  • Osquery
  • Yara
  • Suricata
  • Packetbeat
  • Falco
  • Modsecurity
  • F-Secure
  • Domain Stats
  • Snyk
  • Autoruns
  • Sigcheck
  • Powershell
Description
Advanced Wazuh Rules for more accurate threat detection. Feel free to implement within your own Wazuh environment, contribute, or fork!
Readme 11 MiB
Languages
Python 45.7%
Shell 36.4%
PowerShell 17.3%
Batchfile 0.6%