M3NIX / sigmaio
simple webapp for converting sigma rules into siem queries using the pySigma library
☆47Updated last year
Alternatives and similar repositories for sigmaio:
Users that are interested in sigmaio are comparing it to the libraries listed below
- A home for detection content developed by the delivr.to team☆67Updated last month
- Small-scale threat emulation and detection range built on Elastic and Atomic Redteam.☆38Updated last year
- Library of threat hunts to get any user started!☆42Updated 4 years ago
- Sigma detection rules for hunting with the threathunting-keywords project☆55Updated 2 weeks ago
- Jupyter Notebooks for Cyber Threat Intelligence☆36Updated last year
- An experimental script to perform bulk parsing of arbitrary file features with YARA and console logging.☆21Updated 2 years ago
- ☆21Updated 2 years ago
- Track progress and keep notes while working through likethecoins' CTI Self Study Plan☆28Updated 2 years ago
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆36Updated last week
- Cumulonimbus-UAL_Extractor is a PowerShell based tool created by the Tesorion CERT team to help gather the Unified Audit Logging out of a…☆19Updated last year
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆25Updated 2 months ago
- Intelligence around common attacker behaviors (MITRE ATT&CK TTPs), in the form of ATT&CK Navigator "layer" json files.☆34Updated 2 years ago
- Remote access and Antivirus Logging Database☆42Updated 10 months ago
- This repository contains sample log data that were collected after running adversary simulations in Microsoft 365☆20Updated 5 months ago
- Logbook for Digital Forensics and Incident Response☆50Updated 8 months ago
- This project is an Ansible Role to execute Atomic Red Team tests against multiple machines by wrapping Invoke-AtomicRedTeam☆26Updated 8 months ago
- User Feedback Space of #MitreAssistant☆37Updated last year
- Random notes collected on the intertubes relating to DFIR☆32Updated last year
- Incident response teams usually working on the offline data, collecting the evidence, then analyze the data☆44Updated 3 years ago
- Baseline a Windows System against LOLBAS☆25Updated 10 months ago
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆51Updated 4 months ago
- CarbonBlack EDR detection rules and response actions☆71Updated 6 months ago
- my MSTICpy practice and custom tools repository☆11Updated 4 months ago
- The ultimate solution for remotely deploying Crowdstrike sensors quickly and discreetly on any other EDR platform.☆22Updated 6 months ago
- Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.☆31Updated last month
- Scripts to integrate DFIR-IRIS, MISP and TimeSketch☆33Updated 3 years ago
- Automatic detection engineering technical state compliance☆54Updated 8 months ago
- Cyber Threats Detection Rules☆14Updated 2 months ago
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆67Updated 3 weeks ago
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆118Updated last year