Ansible playbook to convert Sigma rules to ElastAlert rules
☆10Feb 5, 2021Updated 5 years ago
Alternatives and similar repositories for sigma-to-elastalert
Users that are interested in sigma-to-elastalert are comparing it to the libraries listed below
Sorting:
- Create alerts in The Hive from your Graylog alerts, to be turned into Hive cases.☆45Aug 17, 2020Updated 5 years ago
- ☆19Oct 23, 2020Updated 5 years ago
- pySigma Cookiecutter backend template☆24Sep 17, 2025Updated 5 months ago
- A10’s ARM templates for Azure cloud☆11Sep 29, 2023Updated 2 years ago
- The Sigma command line interface based on pySigma☆177Feb 5, 2026Updated 3 weeks ago
- Sigma Detection Rule Repository☆92Jun 18, 2020Updated 5 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆11Jun 21, 2018Updated 7 years ago
- ATS Score Checker a ultimate tool for enhancing resume's compatibility with Applicant Tracking Systems (ATS). This application helps job …☆12Jul 9, 2024Updated last year
- A collection of useful PowerShell tools to collect, organize, and visualize Sysmon event data☆39Mar 23, 2020Updated 5 years ago
- The All In One Script!☆10Feb 12, 2020Updated 6 years ago
- DEFCON 26 Flying Skull Badge☆13Jun 6, 2021Updated 4 years ago
- A Shodan-based tool to discover publicly exposed Ollama instances and list available LLM models.☆20May 27, 2025Updated 9 months ago
- A Sigma based detection pipeline☆13Dec 15, 2023Updated 2 years ago
- ☆14Feb 8, 2020Updated 6 years ago
- Template for MkDocs Material☆11Jan 1, 2026Updated 2 months ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 6 years ago
- ☆14Jan 18, 2020Updated 6 years ago
- Automated Real-Time Threat Hunting with ATD, Active Response and Elasticsearch/Kibana☆10Aug 17, 2018Updated 7 years ago
- Simple Ansible playbook and role for setting a software channel and upgrading RouterOS on mikrotik devices☆11Aug 1, 2022Updated 3 years ago
- A Docker lab integrating Splunk SIEM with Ollama LLM via Model Context Protocol for AI-powered security operations. Features Promptfoo e…☆18Aug 17, 2025Updated 6 months ago
- Transform EQL detection rules to VQL artifacts☆12Nov 12, 2021Updated 4 years ago
- ☆13Sep 10, 2021Updated 4 years ago
- SecTor - Not-So-Secret Agents: Deploying AI to Optimize Security Operations☆30Oct 15, 2025Updated 4 months ago
- Scripts and tools to automate a Windows 7 installation for QEMU☆14Nov 4, 2015Updated 10 years ago
- CTF designed for Middle School-aged kids☆12Oct 18, 2024Updated last year
- [ARCHIVED -- USE TXT2DETECTION] A command line tool that converts Sigma Rules into STIX 2.1 Objects.☆12Feb 19, 2026Updated last week
- ☆11May 13, 2024Updated last year
- Sigma to Wazuh rule converter☆18Sep 28, 2025Updated 5 months ago
- Generates TCP/UDP stream configuration files for NGINX based on the backend servers and ports provided☆11May 23, 2019Updated 6 years ago
- Python Remote Administration Tool☆14Jan 8, 2017Updated 9 years ago
- Sys Mon! Why yu nuh logging dat?☆12Dec 10, 2018Updated 7 years ago
- ☆14Jul 26, 2024Updated last year
- ☆11Mar 26, 2018Updated 7 years ago
- A curated list of my GitHub stars!☆18Sep 29, 2017Updated 8 years ago
- Send events from G Suite to McAfee SIEM☆13Aug 23, 2019Updated 6 years ago
- This is a basic series of bash scripts that will build and configure a new NetBox instance per the official documentation.☆13Oct 15, 2025Updated 4 months ago
- Lightweight secure AI chat client.☆18Feb 22, 2026Updated last week
- LaTeX Report Template for Offensive Security's OSCP Exam.☆13Mar 13, 2022Updated 3 years ago
- Tool (CLI) for using haveibeenpwned through its API (only passwords for now)☆11Apr 26, 2018Updated 7 years ago