Automated Use Case Testing
☆171May 1, 2018Updated 7 years ago
Alternatives and similar repositories for ypsilon
Users that are interested in ypsilon are comparing it to the libraries listed below
Sorting:
- Sandbox feature upgrade with the help of wrapped samples☆76Jun 23, 2018Updated 7 years ago
- Log Entry to Sigma Rule Converter☆107Mar 3, 2022Updated 4 years ago
- An ELK environment containing interesting security datasets.☆136May 11, 2020Updated 5 years ago
- Repository for SPEED SIEM Use Case Framework☆60May 2, 2020Updated 5 years ago
- Elasticsearch/Kibana environment and log data for Sigma workshop☆26Dec 20, 2019Updated 6 years ago
- A Splunk App containing Sigma detection rules, which can be updated from a Git repository.☆111Feb 6, 2020Updated 6 years ago
- Test Blue Team detections without running any attack.☆272May 2, 2024Updated last year
- Converts Sigma detection rules to a Splunk alert configuration.☆115May 18, 2020Updated 5 years ago
- ☆349Mar 19, 2021Updated 5 years ago
- Splunk code (SPL) for serious threat hunters and detection engineers.☆291Jan 15, 2024Updated 2 years ago
- Actionable analytics designed to combat threats☆1,005May 25, 2022Updated 3 years ago
- Sources, configuration and how to detect evil things utilizing Microsoft Sysmon.☆938Dec 12, 2023Updated 2 years ago
- Accompanying PowerShell Modules for DevSec Defense Presentation☆30Apr 15, 2018Updated 7 years ago
- Repository for my ATT&CK analysis research.☆70May 16, 2019Updated 6 years ago
- An information security preparedness tool to do adversarial simulation.☆1,137Apr 1, 2019Updated 6 years ago
- Windows Defender ATP - Advanced Hunting Queries☆22Apr 12, 2018Updated 7 years ago
- 16,432 Free Yara rules created by☆391Jun 1, 2019Updated 6 years ago
- ☆53Mar 4, 2019Updated 7 years ago
- Data from a BRAWL Automated Adversary Emulation Exercise☆212Oct 2, 2020Updated 5 years ago
- SIEGMA - Transform Sigma rules into SIEM consumables☆159Mar 10, 2025Updated last year
- A Yara rule generator for finding related samples and hunting☆162Sep 11, 2022Updated 3 years ago
- A Splunk app with saved reports derived from Sigma rules☆73Apr 24, 2018Updated 7 years ago
- Utilities for Sysmon☆1,576Sep 21, 2025Updated 6 months ago
- A Splunk app to use MISP in background☆112Jan 8, 2026Updated 2 months ago
- Re-play Security Events☆1,728Mar 20, 2024Updated 2 years ago
- Utilities for MITRE™ ATT&CK☆1,050Jan 3, 2026Updated 2 months ago
- ☆1,090May 1, 2019Updated 6 years ago
- Detect Tactics, Techniques & Combat Threats☆2,268Jan 21, 2026Updated 2 months ago
- Oriana is a threat hunting tool that leverages a subset of Windows events to build relationships, calculate totals and run analytics. The…☆176Jun 10, 2021Updated 4 years ago
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,501Jan 12, 2026Updated 2 months ago
- Automated, Collection, and Enrichment Platform☆324Nov 14, 2019Updated 6 years ago
- Sysmon config for both Windows and Linux Devices. Windows one is a bit dated☆55Jul 10, 2024Updated last year
- Threat Detection & Anomaly Detection rules for popular open-source components☆53Jul 27, 2022Updated 3 years ago
- Python script to automatically create sigma rules from The hive observables☆25Mar 17, 2019Updated 7 years ago
- Dovehawk is a Zeek module that automatically imports MISP indicators and reports Sightings☆122Jul 12, 2021Updated 4 years ago
- Mapping the MITRE ATT&CK Matrix with Osquery☆808May 11, 2023Updated 2 years ago
- A toolset to make a system look as if it was the victim of an APT attack☆2,722Sep 23, 2025Updated 5 months ago
- Main Sigma Rule Repository☆10,203Mar 15, 2026Updated last week
- Deploy and maintain Symon through the Splunk Deployment Sever☆32Jul 30, 2020Updated 5 years ago