M3NIX / sigmaio
simple webapp for converting sigma rules into siem queries using the pySigma library
☆47Updated last year
Related projects ⓘ
Alternatives and complementary repositories for sigmaio
- A home for detection content developed by the delivr.to team☆59Updated last week
- Small-scale threat emulation and detection range built on Elastic and Atomic Redteam.☆35Updated 11 months ago
- Sigma detection rules for hunting with the threathunting-keywords project☆47Updated 3 weeks ago
- Remote access and Antivirus Logging Database☆41Updated 6 months ago
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆56Updated last week
- Library of threat hunts to get any user started!☆40Updated 4 years ago
- User Feedback Space of #MitreAssistant☆37Updated last year
- Full of public notes and Utilities☆87Updated last week
- ☆41Updated 7 months ago
- Incident response teams usually working on the offline data, collecting the evidence, then analyze the data☆44Updated 2 years ago
- Automatic detection engineering technical state compliance☆51Updated 4 months ago
- Logbook for Digital Forensics and Incident Response☆49Updated 4 months ago
- My Jupyter Notebooks☆36Updated 7 months ago
- A browser extension for threat hunting that provides one UI for different SIEMs/EDRs and simplifies investigation☆75Updated 6 months ago
- CSIRT Jump Bag☆27Updated 7 months ago
- Cyber Threats Detection Rules☆13Updated 2 months ago
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆19Updated 3 months ago
- Cumulonimbus-UAL_Extractor is a PowerShell based tool created by the Tesorion CERT team to help gather the Unified Audit Logging out of a…☆18Updated last year
- Random notes collected on the intertubes relating to DFIR☆32Updated last year
- Python library for threat intelligence☆80Updated 4 months ago
- Repository for SPEED SIEM Use Case Framework☆52Updated 4 years ago
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆27Updated last month
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆115Updated 11 months ago
- ☆1Updated last month
- MITRE Shield website☆18Updated 3 years ago
- Scripts to integrate DFIR-IRIS, MISP and TimeSketch☆31Updated 2 years ago
- Intelligence around common attacker behaviors (MITRE ATT&CK TTPs), in the form of ATT&CK Navigator "layer" json files.☆34Updated 2 years ago
- Adversarial Interception Mission Oriented Discovery and Disruption Framework, or AIMOD2, is a structured threat hunting approach to proac…☆85Updated last year
- ☆85Updated 9 months ago