Detection-Rules
About this automation
SOC lab demonstrating detection engineering through simulated attacks such as lateral movement via PsExec/Impacket. Uses Elastic Security for behavior-based detections and an automated pipeline with n8n and osTicket to simulate real-world incident response workflows.
How to Use This Repository
This is a community-contributed repository for n8n. To use these workflows:
- Clone the repository to your local machine:
git clone https://github.com/greg1125/Detection-Rules - Explore the repository for
.jsonor documentation files. - Follow the repository's internal README for specific setup instructions.