Security-Experts-Community / open-xp-rules
Открытый репозиторий с правилами на языке eXtraction and Processing (XP)
☆19Updated last month
Related projects: ⓘ
- Enterprise Response Model & Common Knowledge☆35Updated 3 months ago
- Chrome extension for SOC automations☆31Updated last month
- реп полезностей для PT MaxPatrol SIEM☆22Updated last year
- Set of SIGMA rules (>320) mapped to MITRE ATT&CK tactic and techniques☆300Updated 3 months ago
- MP SIEM SDK☆23Updated 2 months ago
- Splunk code (SPL) for serious threat hunters and detection engineers.☆263Updated 8 months ago
- Set of EVTX samples (>270) mapped to MITRE ATT&CK tactic and techniques to measure your SIEM coverage or developed new use cases.☆497Updated 2 weeks ago
- A collection of Splunk's Search Processing Language (SPL) for Threat Hunting with CrowdStrike Falcon☆184Updated 4 years ago
- ☆503Updated last month
- Sigma rule specification☆105Updated 3 weeks ago
- Repository for threat hunting and detection queries, etc. for Defender for Endpoint and Microsoft Sentinel in KQL(Kusto Query Language).☆595Updated last month
- Python library to parse and convert Sigma rules into queries (and whatever else you could imagine)☆382Updated this week
- Documentation and scripts to properly enable Windows event logs.☆532Updated last year
- A standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logs☆658Updated last month
- Rules generated from our investigations.☆186Updated last month
- OSSEM Detection Model☆166Updated last year
- Public script from SANS FOR509 Enterprise Cloud Incident Response☆170Updated last week
- SIEGMA - Transform Sigma rules into SIEM consumables☆139Updated last year
- A curated list of resources for DFIR through Microsoft Defender for Endpoint leveraging kusto queries, powershell scripts, tools such as …☆348Updated this week
- Pointing cybersecurity teams to thousands of detection rules and offensive security tests aligned with common attacker techniques☆120Updated 6 months ago
- The Business Email Compromise Guide sets out to describe 10 steps for performing a Business Email Compromise (BEC) investigation in an Of…☆241Updated 3 years ago
- An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.☆176Updated 2 months ago
- an excel-centric approach for the MITRE ATT&CK® Tactics and Techniques☆178Updated 2 years ago
- Consolidation of various resources related to Microsoft Sysmon & sample data/log☆103Updated 3 years ago
- Repository of SentinelOne Deep Visibility queries.☆116Updated 3 years ago
- Sigma rules from Joe Security☆199Updated last month
- An opensource sigma conversion tool built using pysigma☆90Updated 2 weeks ago
- The goal of this repo is to archive artifacts from all versions of various OS's and categorizing them by type. This will help with artifa…☆544Updated 11 months ago
- A PowerShell module for acquisition of data from Microsoft 365 and Azure for Incident Response and Cyber Security purposes.☆448Updated last week
- Incident Response Documentation made easy. Developed by Incident Responders for Incident Responders☆758Updated 11 months ago