SigmaHQ / cookiecutter-pySigma-backend
pySigma Cookiecutter backend template
☆20Updated 9 months ago
Related projects: ⓘ
- A community event for security researchers to share their favorite notebooks☆105Updated 7 months ago
- Recon Hunt Queries☆76Updated 3 years ago
- ☆28Updated last year
- pySigma Splunk backend☆33Updated 5 months ago
- Dettectinator - The Python library to your DeTT&CT YAML files.☆102Updated 3 weeks ago
- pySigma Elasticsearch backend☆41Updated 3 weeks ago
- A pySigma wrapper and langchain toolkit for automatic rule creation/translation☆65Updated last month
- Collects a listing of MITRE ATT&CK Techniques, then discovers Splunk ESCU detections for each technique☆64Updated 6 months ago
- Synthetic Adversarial Log Objects: A Framework for synthentic log generation☆76Updated 8 months ago
- An opensource sigma conversion tool built using pysigma☆90Updated 2 weeks ago
- ☆84Updated 3 months ago
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆24Updated 9 months ago
- Small-scale threat emulation and detection range built on Elastic and Atomic Redteam.☆34Updated 9 months ago
- Import specific data sources into the Sigma generic and open signature format.☆77Updated 2 years ago
- Threat Detection & Anomaly Detection rules for popular open-source components☆49Updated 2 years ago
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆49Updated 2 years ago
- ☆101Updated this week
- SigmaHQ pySigma CrowdStrike processing pipeline☆18Updated this week
- Provides detection capabilities and log conversion to evtx or syslog capabilities☆51Updated 2 years ago
- Awesome Splunk SPL hunt queries that can be used to detect the latest vulnerability exploitation attempts & subsequent compromise☆55Updated 4 months ago
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆66Updated 9 months ago
- A cross-platform baselining, threat hunting, and attack surface analysis tool for security teams.☆170Updated last month
- ☆79Updated last month
- Knowing which rule should trigger according to the redcannary test☆10Updated 4 months ago
- Convert Sigma rules to LogRhythm searches☆19Updated 2 years ago
- Validates Sigma rules using the JSON schema☆14Updated 6 months ago
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆93Updated 6 months ago
- ☆68Updated last year
- A dataset containing Office 365 Unified Audit Logs for security research and detection☆41Updated 2 years ago
- Augmentation to Machine Readable CTI☆25Updated this week
- ATT&CK Powered Suit is a browser extension that puts the complete MITRE ATT&CK® knowledge base at your fingertips with text search, conte…☆69Updated last week