SigmaHQ pySigma CrowdStrike processing pipeline
☆27Nov 30, 2025Updated 3 months ago
Alternatives and similar repositories for pySigma-backend-crowdstrike
Users that are interested in pySigma-backend-crowdstrike are comparing it to the libraries listed below
Sorting:
- A POC to implement Detection-as-Code with Terraform and Sumo Logic.☆31Jul 27, 2023Updated 2 years ago
- Extract CIS benchmarks from PDFs☆16Jul 26, 2023Updated 2 years ago
- Knowledge base of analytics designed to cover threats based on MITRE's ATT&CK.☆23Dec 13, 2018Updated 7 years ago
- ☆15Jul 20, 2022Updated 3 years ago
- pySigma Cookiecutter backend template☆24Sep 17, 2025Updated 5 months ago
- Log Entry to Sigma Rule Converter☆107Mar 3, 2022Updated 4 years ago
- ☆11Feb 14, 2023Updated 3 years ago
- Unleash the power of the Falcon Platform at the CLI☆139Oct 6, 2025Updated 4 months ago
- This project aims to bridge the gap between Microsoft Attack Surface Reduction (ASR) rules and MITRE ATT&CK by mapping ASR rules to their…☆29Nov 20, 2024Updated last year
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆28Apr 22, 2023Updated 2 years ago
- Community content for LogRhythm Axon. Includes Dashboards, searches, analytics rules, processing policies and more.☆10Jul 26, 2024Updated last year
- ☆10Feb 12, 2026Updated 3 weeks ago
- ☆84Mar 1, 2024Updated 2 years ago
- A companion Github repo for the book - Threat Hunting macOS by Jaron Bradley☆18Jul 26, 2025Updated 7 months ago
- Tool to extract Sessions, MessageID(s) and find the emails belonging to MessageID(s). This script utilizes the MailItemsAccessed features…☆41Oct 20, 2020Updated 5 years ago
- ☆33Feb 25, 2022Updated 4 years ago
- pySigma Splunk backend☆41Updated this week
- The Sigma command line interface based on pySigma☆178Feb 5, 2026Updated 3 weeks ago
- ☆44Nov 28, 2025Updated 3 months ago
- Python library to parse and convert Sigma rules into queries (and whatever else you could imagine)☆532Feb 15, 2026Updated 2 weeks ago
- Mindmap for OWASP Top 10 LLM Application and Relationship between them☆13Dec 11, 2024Updated last year
- Threat Network Detection in Online Social Networks☆10Jan 20, 2017Updated 9 years ago
- A Streamlit-based chatbot application using Gemini models for NLP. Features include light/dark mode toggle, model selection (Gemini 1.5 F…☆10May 23, 2024Updated last year
- Project that creates a Kubernetes environment in Azure (AKS) and protects it with CloudGuard CSPM / Workload and Appsec technologies☆10Jun 12, 2023Updated 2 years ago
- ATS Score Checker a ultimate tool for enhancing resume's compatibility with Applicant Tracking Systems (ATS). This application helps job …☆12Jul 9, 2024Updated last year
- ☆13Jun 26, 2025Updated 8 months ago
- Some YARA rules i will add from time to time☆12May 31, 2019Updated 6 years ago
- Hunting Queries for Microsoft Defender Security Center https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defe…☆40Apr 8, 2021Updated 4 years ago
- NTLMRelay for MS Exchange☆11Nov 13, 2018Updated 7 years ago
- String extraction and classification tool for binary files, designed to extract only the strings that can be considered relevant (i.e. no…☆10Aug 9, 2020Updated 5 years ago
- Automated Real-Time Threat Hunting with ATD, Active Response and Elasticsearch/Kibana☆10Aug 17, 2018Updated 7 years ago
- Small and highly portable detection tests.☆12Oct 12, 2017Updated 8 years ago
- CodiMD - Realtime collaborative markdown notes on all platforms.☆14Jan 7, 2025Updated last year
- Build your own threat hunting maturity model☆11Oct 29, 2017Updated 8 years ago
- simple C# portscanner - written for playing around with Metasploit's Execute-Assembly☆10Jul 1, 2023Updated 2 years ago
- ☆10Aug 11, 2025Updated 6 months ago
- ☆11Dec 9, 2025Updated 2 months ago
- This directory contains random scripts from threat hunting or malware research☆11Feb 15, 2018Updated 8 years ago
- Various stuff and tweaks I have around Obsidian☆12Jun 20, 2025Updated 8 months ago