This is a collection of various Wazuh detection rules for vulnerabilities, malware and adversary emulations.