☆12Jul 15, 2022Updated 3 years ago
Alternatives and similar repositories for Microsoft-Sentinel-SIGMA-Rules-Workbook
Users that are interested in Microsoft-Sentinel-SIGMA-Rules-Workbook are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Sigma Queries turned into KQL for Defender using pysigma☆12Jun 20, 2024Updated last year
- This code snippet retrieves Azure Sentinel rules that are mapped to MITRE ATT&CK Framework and generates the related MITRE D3FEND defense…☆74Jun 28, 2021Updated 4 years ago
- Azure Function for the Microsoft Sentinel Triage AssistanT (STAT)☆15Mar 4, 2026Updated 3 weeks ago
- Create a cool process tree like https://twitter.com/ACEResponder.☆35Mar 1, 2023Updated 3 years ago
- MISP to Splunk Enterprise Security Theat Intelligence Framework Integration☆14Jul 11, 2023Updated 2 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- This repository is used by FalconForce to release parts of the internal tools used for maintaining, validating and automatically deployin…☆18Mar 10, 2023Updated 3 years ago
- A script designed to test passwords against user accounts within an Active Directory environment, offering customizable Account Lockout T…☆17Jan 28, 2026Updated 2 months ago
- Detection Engineering Tools☆25Mar 20, 2026Updated last week
- A collection of content for blue team professionals, designed to support both reactive and proactive cybersecurity measures of every aspe…☆33Oct 24, 2025Updated 5 months ago
- HTTP based framework for building command and control components for remote access trojans☆15Aug 2, 2021Updated 4 years ago
- Community content for LogRhythm Axon. Includes Dashboards, searches, analytics rules, processing policies and more.☆10Jul 26, 2024Updated last year
- General Content☆27Dec 23, 2025Updated 3 months ago
- Docker container of SANS Investigative Forensic Toolkit (SIFT) Workstation Version 3☆10Oct 9, 2016Updated 9 years ago
- An IDE and translation engine for detection engineers and threat hunters. Be faster, write smarter, keep 100% privacy.☆179Dec 2, 2025Updated 3 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆122Jan 29, 2026Updated 2 months ago
- ☆25Jul 12, 2023Updated 2 years ago
- This project is an Ansible Role to execute Atomic Red Team tests against multiple machines by wrapping Invoke-AtomicRedTeam☆27Jul 4, 2024Updated last year
- Jenkins Security Research or Hacking Jenkins ;)☆12Dec 10, 2024Updated last year
- Power Prompt - Enhance ChatGPT & OpenAi interaction. Seamless conversations. Choose models, save templates, set temp, length & tokens.☆19Feb 15, 2023Updated 3 years ago
- SIEGMA - Transform Sigma rules into SIEM consumables☆159Mar 10, 2025Updated last year
- Tool for obtaining information about PPL processes☆16Feb 12, 2024Updated 2 years ago
- ☆10Jul 1, 2023Updated 2 years ago
- Hunting Newly Registered Domains☆10Jan 6, 2019Updated 7 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A platform for extracting and shipping security value from your data lake to Sentinel.☆35Sep 19, 2024Updated last year
- This Repository gives the best and possible strategies against hunting the ransomware☆26Aug 23, 2022Updated 3 years ago
- Resources for the Customizing Chef book☆11Sep 12, 2014Updated 11 years ago
- Dettectinator - The Python library to your DeTT&CT YAML files.☆118Jan 22, 2026Updated 2 months ago
- Generate bulk YARA rules from YAML input☆22Feb 3, 2020Updated 6 years ago
- ☆34Jun 13, 2023Updated 2 years ago
- BAADTokenBroker is a post-exploitation tool designed to interact with Microsoft Entra ID device-bound keys.☆63Mar 11, 2026Updated 2 weeks ago
- List of MurmurHash3 favicon hashes of widely used technologies by vendor to search with Shodan.☆36Apr 14, 2024Updated last year
- AI-Powered, Local Pythonic Coding Agent 🐞💻☆25Mar 3, 2025Updated last year
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- ☆10Sep 12, 2024Updated last year
- ☆13Aug 17, 2020Updated 5 years ago
- Fast multipattern regular expression searching for digital forensics☆18Jul 31, 2019Updated 6 years ago
- Fast Windows post-exploitation wins after initial access.☆29Jan 28, 2026Updated 2 months ago
- Webhook endpoint for Fireflies transcripts with intent detection☆20Nov 1, 2024Updated last year
- Collection of videos of Raids on Cybercriminals☆21Mar 19, 2025Updated last year
- Detection Ideas & Rules repository.☆178Sep 10, 2021Updated 4 years ago