S2AN - Mapper of Sigma/Suricata Rules/Signatures ➡️ MITRE ATT&CK Navigator
☆91Dec 8, 2022Updated 3 years ago
Alternatives and similar repositories for S2AN
Users that are interested in S2AN are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Import specific data sources into the Sigma generic and open signature format.☆79May 6, 2022Updated 3 years ago
- SIEGMA - Transform Sigma rules into SIEM consumables☆159Mar 10, 2025Updated last year
- Actionable analytics designed to combat threats☆1,009May 25, 2022Updated 3 years ago
- Elemental - An ATT&CK Threat Library☆319Dec 8, 2022Updated 3 years ago
- Automatic detection engineering technical state compliance☆55Jul 7, 2024Updated last year
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- OSSEM Modular☆27Jun 29, 2020Updated 5 years ago
- A script to create and assign SOP tasks into the cases☆20Aug 16, 2020Updated 5 years ago
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆209Jul 21, 2022Updated 3 years ago
- Some YARA rules i will add from time to time☆12May 31, 2019Updated 6 years ago
- Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs for testing the EDR detection…☆869Jan 20, 2022Updated 4 years ago
- ☆20Oct 23, 2020Updated 5 years ago
- Firepit - STIX Columnar Storage☆18Jun 5, 2024Updated last year
- Building environments to replicate small networks and deploy applications☆333Jan 9, 2026Updated 3 months ago
- ☆14May 30, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- You can access the sigma rules to detect malicious activities. It is organized by Mitre Att&ck categories.☆13Feb 7, 2022Updated 4 years ago
- ATT&CK Remote Threat Hunting Incident Response☆206Dec 8, 2024Updated last year
- Actionable analytics designed to combat threats based on MITRE's ATT&CK.☆23Aug 21, 2019Updated 6 years ago
- Dettectinator - The Python library to your DeTT&CT YAML files.☆117Jan 22, 2026Updated 3 months ago
- A website and framework for testing NIDS detection☆57Aug 29, 2021Updated 4 years ago
- An ELK environment containing interesting security datasets.☆136May 11, 2020Updated 5 years ago
- Tools to rapidly deploy a threat hunting capability on Azure Sentinel that leverages Sysmon and MITRE ATT&CK☆1,075Nov 28, 2024Updated last year
- DynamiteNSM is a free Network Security Monitor developed by Dynamite Analytics to enable network visibility and advanced cyber threat det…☆172May 23, 2023Updated 2 years ago
- A Canary which fires when uninstalled☆34Mar 16, 2021Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Knowledge base of analytics designed to cover threats based on MITRE's ATT&CK.☆23Dec 13, 2018Updated 7 years ago
- Kerberoast Detection Script☆30Oct 31, 2024Updated last year
- Serverless honeytoken 🕵🏻♂️☆81Jan 10, 2023Updated 3 years ago
- Re-play Security Events☆1,746Mar 20, 2024Updated 2 years ago
- ☆16May 13, 2021Updated 4 years ago
- Open Source Security Events Metadata (OSSEM)☆1,293Feb 27, 2023Updated 3 years ago
- A few scripts I put together to send and receive data from an Azure Log Analytics workspace leveraging the Azure Monitor HTTP Data Collec…☆22May 22, 2023Updated 2 years ago
- Kibana app for RedELK☆18Mar 19, 2023Updated 3 years ago
- A repository of my own Sigma detection rules.☆165Nov 25, 2025Updated 5 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Generates a detailed CSV file containing Sigma Rules statistics for each service or category, and each level, offering a holistic view of…☆10Dec 22, 2023Updated 2 years ago
- Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by devel…☆738Updated this week
- an excel-centric approach for the MITRE ATT&CK® Tactics and Techniques☆188May 5, 2022Updated 3 years ago
- Windows Events Attack Samples☆2,555Jan 24, 2023Updated 3 years ago
- Threat Hunting & Incident Investigation with Osquery☆217Mar 30, 2022Updated 4 years ago
- Sources, configuration and how to detect evil things utilizing Microsoft Sysmon.☆940Dec 12, 2023Updated 2 years ago
- Python Script to access ATT&CK content available in STIX via a public TAXII server☆569Dec 19, 2025Updated 4 months ago