simple webapp for converting sigma rules into siem queries using the pySigma library
☆52Sep 1, 2023Updated 2 years ago
Alternatives and similar repositories for sigmaio
Users that are interested in sigmaio are comparing it to the libraries listed below
Sorting:
- Knowing which rule should trigger according to the redcannary test☆11Nov 23, 2024Updated last year
- Emulates the VirusTotal "vt" YARA module for livehunt rule debugging/testing☆25May 29, 2023Updated 2 years ago
- A Sigma based detection pipeline☆13Dec 15, 2023Updated 2 years ago
- ☆21Jul 24, 2022Updated 3 years ago
- Pointer was developed for massive hunting and mapping Cobalt Strike servers exposed on the internet.☆69Apr 12, 2022Updated 3 years ago
- Jupyter Notebooks for Cyber Threat Intelligence☆35Sep 14, 2023Updated 2 years ago
- Splunk Technology-AddOn for Aurora Sigma-Based EDR Agent. It helps parse and configure the necessary inputs to neatly consume Aurora EDR …☆13Sep 27, 2022Updated 3 years ago
- RopstenCtf is an easy tool to interact with the ethereum ropsten network for ctf purpose and more.☆17Jul 18, 2022Updated 3 years ago
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆42Oct 29, 2024Updated last year
- A Python Obfuscator through AST modification☆27Nov 15, 2019Updated 6 years ago
- SIEGMA - Transform Sigma rules into SIEM consumables☆159Mar 10, 2025Updated 11 months ago
- A tool for check available dependency packages across npmjs, PyPI or RubyGems registry.☆31Mar 2, 2022Updated 4 years ago
- Right-To-Left Override POC☆36Mar 21, 2022Updated 3 years ago
- Partially offline multi-language translator built upon Huggingface transformers.☆17Sep 12, 2022Updated 3 years ago
- Import specific data sources into the Sigma generic and open signature format.☆79May 6, 2022Updated 3 years ago
- Automatic detection engineering technical state compliance☆55Jul 7, 2024Updated last year
- Cisco Unfied Call Manager enumeration☆25Jul 13, 2022Updated 3 years ago
- Pandora is an analysis framework to discover if a file is suspicious and conveniently show the results☆275Updated this week
- Python library to parse and convert Sigma rules into queries (and whatever else you could imagine)☆532Feb 15, 2026Updated 2 weeks ago
- Ransomware dataset, containing dynamic behaviour of more than 60 distinct ransomware families.☆10Aug 29, 2022Updated 3 years ago
- Sample SecOps scripts and Utilities☆12Jun 19, 2024Updated last year
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆60Mar 12, 2022Updated 3 years ago
- UPX - the Ultimate Packer for eXecutables☆67Mar 9, 2022Updated 3 years ago
- A Splunk app with saved reports derived from Sigma rules☆73Apr 24, 2018Updated 7 years ago
- A repository to share publicly available Velociraptor detection content☆196Updated this week
- Pritunl Access Control System☆10Feb 16, 2023Updated 3 years ago
- Spider or repeater to find all links.☆10Feb 7, 2021Updated 5 years ago
- Threat Intel and Incident Reponse☆10Aug 29, 2018Updated 7 years ago
- CIFv3 Ubuntu 16.04 Docker Container (Bearded Avenger)☆12Apr 18, 2018Updated 7 years ago
- ☆10Jan 22, 2025Updated last year
- Custom Splunk search command to reconstruct a pstree from Sysmon process creation events (EventCode 1)☆24Mar 3, 2023Updated 2 years ago
- Detect and respond to Cobalt Strike beacons using ETW.☆517Jul 15, 2022Updated 3 years ago
- An opensource sigma conversion tool built using pysigma☆160Feb 9, 2026Updated 3 weeks ago
- The goal of this repo is to archive artifacts from all versions of various OS's and categorizing them by type. This will help with artifa…☆646Nov 7, 2025Updated 3 months ago
- A simple utility to check the status of and/or disable SMBv1 on Windows system via Cb Response's Live Response functionality.☆15May 28, 2019Updated 6 years ago
- *Unofficial* lgtm.com CLI — Use at your own risk. Also don't add more than 3K projects to "My projects" list.☆13Feb 21, 2022Updated 4 years ago
- This project is an Ansible Role to execute Atomic Red Team tests against multiple machines by wrapping Invoke-AtomicRedTeam☆27Jul 4, 2024Updated last year
- Set of SIGMA rules (>350) mapped to MITRE ATT&CK tactic and techniques☆413Nov 8, 2025Updated 3 months ago
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆86Dec 17, 2025Updated 2 months ago