Sigma Detection Rule Repository
☆93Jun 18, 2020Updated 5 years ago
Alternatives and similar repositories for Sigma-Rule-Repository
Users that are interested in Sigma-Rule-Repository are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆20Oct 23, 2020Updated 5 years ago
- A collection of Sigma rules organized by MITRE ATT&CK technique☆18Apr 1, 2026Updated last month
- Threat Detection & Anomaly Detection rules for popular open-source components☆53Jul 27, 2022Updated 3 years ago
- Converts Sigma detection rules to a Splunk alert configuration.☆116May 18, 2020Updated 5 years ago
- A Splunk App containing Sigma detection rules, which can be updated from a Git repository.☆111Feb 6, 2020Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Sigma rules from Joe Security☆237Nov 4, 2024Updated last year
- ⚠️ ARCHIVED**: This repository is no longer actively maintained. All Sigma rules are now managed and available in SIEM Rules☆12Mar 19, 2026Updated last month
- Ansible playbook to convert Sigma rules to ElastAlert rules☆10Feb 5, 2021Updated 5 years ago
- Set of SIGMA rules (>350) mapped to MITRE ATT&CK tactic and techniques☆426Nov 8, 2025Updated 5 months ago
- A repository of my own Sigma detection rules.☆165Nov 25, 2025Updated 5 months ago
- Sigma rules to share with the community☆125Jan 29, 2025Updated last year
- You can access the sigma rules to detect malicious activities. It is organized by Mitre Att&ck categories.☆13Feb 7, 2022Updated 4 years ago
- CeramicSkate0 Sysmon configuration fork file template with default high-quality event tracing☆10Sep 29, 2023Updated 2 years ago
- An ELK environment containing interesting security datasets.☆136May 11, 2020Updated 5 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Check Sigma rules for easy-to-bypass whitelists to make them more robust (https://github.com/SigmaHQ/sigma)☆16Feb 1, 2021Updated 5 years ago
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆61Mar 12, 2022Updated 4 years ago
- A Sigma based detection pipeline☆12Dec 15, 2023Updated 2 years ago
- This is a collection of threat detection rules / rules engines that I have come across.☆298May 5, 2024Updated last year
- Rules generated from our investigations.☆208Jun 17, 2025Updated 10 months ago
- Resources To Learn And Understand SIGMA Rules☆185Feb 14, 2023Updated 3 years ago
- A running list of Windows sources and the related event ids.☆19Aug 2, 2023Updated 2 years ago
- Automatically create YARA rules from malicious documents.☆211May 16, 2022Updated 3 years ago
- Lazy SPL to detect Spring4Shell exploitation☆12Jul 8, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Sunburst IOCs for Splunk Ingest☆18Jan 28, 2021Updated 5 years ago
- Python script that gets IOC from MISP and converts it into BRO intel files.☆13Apr 17, 2016Updated 10 years ago
- Visual Studio Code Microsoft Sysinternal Sysmon configuration file extension.☆54Jul 13, 2023Updated 2 years ago
- Re-play Security Events☆1,743Mar 20, 2024Updated 2 years ago
- Automated Use Case Testing☆171May 1, 2018Updated 8 years ago
- unix_collector is a Live Response collection script for Incident Response on UNIX-like systems using native binaries. Supports AIX, Andro…☆42Jun 10, 2025Updated 10 months ago
- ☆42Sep 16, 2022Updated 3 years ago
- Main Sigma Rule Repository☆10,355Apr 24, 2026Updated last week
- Signature engine for all your logs☆173Nov 13, 2023Updated 2 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Actionable analytics designed to combat threats☆1,009May 25, 2022Updated 3 years ago
- An elevated STIX representation of the MITRE ATT&CK Groups knowledge base☆23May 23, 2022Updated 3 years ago
- ☆2,563Updated this week
- ☆176Apr 24, 2026Updated last week
- ☆14Jan 2, 2025Updated last year
- Trace ScriptBlock execution for powershell v2☆40Jan 14, 2020Updated 6 years ago
- ☆10Dec 24, 2022Updated 3 years ago