ReconInfoSec / sigma-to-elastalertLinks
Ansible playbook to convert Sigma rules to ElastAlert rules
☆10Updated 4 years ago
Alternatives and similar repositories for sigma-to-elastalert
Users that are interested in sigma-to-elastalert are comparing it to the libraries listed below
Sorting:
- Repository for SPEED SIEM Use Case Framework☆56Updated 5 years ago
- A Splunk App containing Sigma detection rules, which can be updated from a Git repository.☆111Updated 5 years ago
- SOC Workflow App helps Security Analysts and Threat Hunters explore suspicious events, look into raw events arriving at the Elastic Stack…☆94Updated 3 years ago
- Collection of useful, up to date, Carbon Black Response Queries☆84Updated 5 years ago
- Sigma Detection Rule Repository☆91Updated 5 years ago
- Converts Sigma detection rules to a Splunk alert configuration.☆115Updated 5 years ago
- ☆42Updated 5 years ago
- Run Velociraptor on Security Onion☆40Updated 3 years ago
- The FASTEST way to consume threat intel.☆69Updated 2 years ago
- Powershell - web traffic whitenoise generator☆47Updated 5 years ago
- A Splunk app to use MISP in background☆113Updated last month
- ☆37Updated 5 years ago
- All-in-one bundle of MISP, TheHive and Cortex☆169Updated 3 years ago
- Recon Hunt Queries☆79Updated 4 years ago
- PowerShell - Endpoint Analysis Solution Your Windows Intranet Needs☆48Updated last year
- SIEGMA - Transform Sigma rules into SIEM consumables☆157Updated 9 months ago
- ATT&CK Remote Threat Hunting Incident Response☆205Updated last year
- ☆55Updated 4 years ago
- Create alerts in The Hive from your Graylog alerts, to be turned into Hive cases.☆45Updated 5 years ago
- Technical add-on for Splunk related to TheHive/Cortex from TheHive project☆53Updated 3 months ago
- misp-cloud - Cloud-ready images of MISP☆74Updated 3 years ago
- RRR (Rapid Response Reporting) is a collection of Incident Response Report objects. They are designed to help incident responders provid…☆37Updated 3 years ago
- BulkStrike enables the usage of CrowdStrike Real Time Response (RTR) to bulk execute commands on multiple machines.☆42Updated 3 years ago
- Pulls IOCs from MISP and adds the to reference sets in QRadar☆34Updated 2 years ago
- Threat Hunting with ELK Workshop (InfoSecWorld 2017)☆65Updated 8 years ago
- Office365 Log Analysis Framework☆81Updated 6 years ago
- Detection Ideas & Rules repository.☆178Updated 4 years ago
- Security Monitoring Resolution Categories☆138Updated 4 years ago
- Synthetic Adversarial Log Objects: A Framework for synthentic log generation☆85Updated last year
- Sunburst IOCs for Splunk Ingest☆18Updated 4 years ago