mirror of
https://github.com/Yamato-Security/WELA.git
synced 2025-12-06 17:22:50 +01:00
add badge
This commit is contained in:
@@ -15,6 +15,7 @@
|
|||||||
<p align="center">
|
<p align="center">
|
||||||
<a href="https://conference.auscert.org.au/speaker/fukusuke-takahashi/"><img src="https://img.shields.io/badge/AUSCERT-2025-blue"></a>
|
<a href="https://conference.auscert.org.au/speaker/fukusuke-takahashi/"><img src="https://img.shields.io/badge/AUSCERT-2025-blue"></a>
|
||||||
<a href="https://www.infosec-city.com/sin-25"><img src="https://img.shields.io/badge/SINCON-2025-blue"></a>
|
<a href="https://www.infosec-city.com/sin-25"><img src="https://img.shields.io/badge/SINCON-2025-blue"></a>
|
||||||
|
<a href="https://codeblue.jp/program/time-table/day2-t3-02/"><img src="https://img.shields.io/badge/CODE%20BLUE-2025-blue"></a>
|
||||||
<a href="https://github.com/Yamato-Security/wela/commits/main/"><img src="https://img.shields.io/github/commit-activity/t/Yamato-Security/wela/main" /></a>
|
<a href="https://github.com/Yamato-Security/wela/commits/main/"><img src="https://img.shields.io/github/commit-activity/t/Yamato-Security/wela/main" /></a>
|
||||||
<a href="https://twitter.com/SecurityYamato"><img src="https://img.shields.io/twitter/follow/SecurityYamato?style=social"/></a>
|
<a href="https://twitter.com/SecurityYamato"><img src="https://img.shields.io/twitter/follow/SecurityYamato?style=social"/></a>
|
||||||
</p>
|
</p>
|
||||||
@@ -57,7 +58,7 @@ WELAはこうした課題を洗い出し、Windowsイベントログ設定改善
|
|||||||
- [`audit-settings` command examples](#audit-settings-command-examples)
|
- [`audit-settings` command examples](#audit-settings-command-examples)
|
||||||
- [audit-filesize](#audit-filesize-1)
|
- [audit-filesize](#audit-filesize-1)
|
||||||
- [`audit-filesize` command examples](#audit-filesize-command-examples)
|
- [`audit-filesize` command examples](#audit-filesize-command-examples)
|
||||||
- [configure](#configure)
|
- [configure](#configure-1)
|
||||||
- [`configure` command examples](#configure-command-examples)
|
- [`configure` command examples](#configure-command-examples)
|
||||||
- [update-rules](#update-rules)
|
- [update-rules](#update-rules)
|
||||||
- [`update-rules` command examples](#update-rules-command-examples)
|
- [`update-rules` command examples](#update-rules-command-examples)
|
||||||
|
|||||||
@@ -15,6 +15,7 @@
|
|||||||
<p align="center">
|
<p align="center">
|
||||||
<a href="https://conference.auscert.org.au/speaker/fukusuke-takahashi/"><img src="https://img.shields.io/badge/AUSCERT-2025-blue"></a>
|
<a href="https://conference.auscert.org.au/speaker/fukusuke-takahashi/"><img src="https://img.shields.io/badge/AUSCERT-2025-blue"></a>
|
||||||
<a href="https://www.infosec-city.com/sin-25"><img src="https://img.shields.io/badge/SINCON-2025-blue"></a>
|
<a href="https://www.infosec-city.com/sin-25"><img src="https://img.shields.io/badge/SINCON-2025-blue"></a>
|
||||||
|
<a href="https://codeblue.jp/program/time-table/day2-t3-02/"><img src="https://img.shields.io/badge/CODE%20BLUE-2025-blue"></a>
|
||||||
<a href="https://github.com/Yamato-Security/wela/commits/main/"><img src="https://img.shields.io/github/commit-activity/t/Yamato-Security/wela/main" /></a>
|
<a href="https://github.com/Yamato-Security/wela/commits/main/"><img src="https://img.shields.io/github/commit-activity/t/Yamato-Security/wela/main" /></a>
|
||||||
<a href="https://twitter.com/SecurityYamato"><img src="https://img.shields.io/twitter/follow/SecurityYamato?style=social"/></a>
|
<a href="https://twitter.com/SecurityYamato"><img src="https://img.shields.io/twitter/follow/SecurityYamato?style=social"/></a>
|
||||||
</p>
|
</p>
|
||||||
@@ -44,7 +45,7 @@ WELA also assesses log configurations **based on real-world Sigma rule coverage*
|
|||||||
- [audit-settings (terminal output)](#audit-settings-terminal-output)
|
- [audit-settings (terminal output)](#audit-settings-terminal-output)
|
||||||
- [audit-settings (GUI)](#audit-settings-gui)
|
- [audit-settings (GUI)](#audit-settings-gui)
|
||||||
- [audit-settings (table)](#audit-settings-table)
|
- [audit-settings (table)](#audit-settings-table)
|
||||||
- [audit-setting (mitre-attack-navigator)](#audit-settings-table)
|
- [audit-settings (mitre-attack-navigator)](#audit-settings-mitre-attack-navigator)
|
||||||
- [audit-filesize](#audit-filesize)
|
- [audit-filesize](#audit-filesize)
|
||||||
- [configure](#configure)
|
- [configure](#configure)
|
||||||
- [Features](#features)
|
- [Features](#features)
|
||||||
@@ -57,7 +58,7 @@ WELA also assesses log configurations **based on real-world Sigma rule coverage*
|
|||||||
- [`audit-settings` command examples](#audit-settings-command-examples)
|
- [`audit-settings` command examples](#audit-settings-command-examples)
|
||||||
- [audit-filesize](#audit-filesize-1)
|
- [audit-filesize](#audit-filesize-1)
|
||||||
- [`audit-filesize` command examples](#audit-filesize-command-examples)
|
- [`audit-filesize` command examples](#audit-filesize-command-examples)
|
||||||
- [configure](#configure)
|
- [configure](#configure-1)
|
||||||
- [`configure` command examples](#configure-command-examples)
|
- [`configure` command examples](#configure-command-examples)
|
||||||
- [update-rules](#update-rules)
|
- [update-rules](#update-rules)
|
||||||
- [`update-rules` command examples](#update-rules-command-examples)
|
- [`update-rules` command examples](#update-rules-command-examples)
|
||||||
|
|||||||
Reference in New Issue
Block a user