Detection-Rules

About this automation

SOC lab demonstrating detection engineering through simulated attacks such as lateral movement via PsExec/Impacket. Uses Elastic Security for behavior-based detections and an automated pipeline with n8n and osTicket to simulate real-world incident response workflows.

How to Use This Repository

This is a community-contributed repository for n8n. To use these workflows:

  1. Clone the repository to your local machine:
    git clone https://github.com/greg1125/Detection-Rules
  2. Explore the repository for .json or documentation files.
  3. Follow the repository's internal README for specific setup instructions.