mirror of
https://github.com/socfortress/Wazuh-Rules.git
synced 2025-11-02 04:43:15 +00:00
3379a94a088accbe5e2a0ae19802dba12cc209a3
SOCFortress Wazuh-Rules

Have Wazuh deployed and ingesting your logs but looking for some better detection rules? Look no further. The objective for this repo is to provide the Wazuh community with rulesets that are more accurate, descriptive, and enriched from various sources and integrations.
FEEL FREE TO MERGE REQUEST ANY RULES THAT YOU THINK THE COMMUNITY COULD BENEFIT FROM
Categories of various tools that this repo containes rules for are below
- Sysmon for Windows
- Sysmon for Linux
- Office365
- Microsoft Defender
- Sophos
- MISP
- Osquery
- Yara
- Suricata
- Packetbeat
- Falco
- Modsecurity
- F-Secure
- Domain Stats
- Snyk
- Autoruns
- Sigcheck
- Powershell
Description
Advanced Wazuh Rules for more accurate threat detection. Feel free to implement within your own Wazuh environment, contribute, or fork!
Languages
Python
45.7%
Shell
36.4%
PowerShell
17.3%
Batchfile
0.6%