SigmaHQ / pySigma-backend-elasticsearchLinks
pySigma Elasticsearch backend
☆56Updated last week
Alternatives and similar repositories for pySigma-backend-elasticsearch
Users that are interested in pySigma-backend-elasticsearch are comparing it to the libraries listed below
Sorting:
- The Sigma command line interface based on pySigma☆171Updated last week
- Automated YARA Rule Standardization and Quality Assurance Tool☆269Updated last week
- Sigma rules to share with the community☆123Updated 11 months ago
- A pySigma wrapper and langchain toolkit for automatic rule creation/translation☆90Updated 2 months ago
- An IDE and translation engine for detection engineers and threat hunters. Be faster, write smarter, keep 100% privacy.☆168Updated last month
- Welcome to the SEKOIA.IO Community repository!☆173Updated 2 weeks ago
- An opensource sigma conversion tool built using pysigma☆155Updated 3 weeks ago
- ☆78Updated 3 months ago
- Convert Sigma rules to SIEM queries, directly in your browser.☆107Updated 3 weeks ago
- Sample evtx files to use for testing hayabusa detection rules☆64Updated 2 months ago
- FJTA (Forensic Journal Timeline Analyzer) is a tool that analyzes Linux filesystem (ext4, XFS) journals (not systemd-journald logs), gene…☆99Updated last week
- Rules generated from our investigations.☆203Updated 6 months ago
- yara detection rules for hunting with the threathunting-keywords project☆157Updated 8 months ago
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆85Updated 3 weeks ago
- pySigma Splunk backend☆42Updated last month
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆52Updated this week
- YARA rule analyzer to improve rule quality and performance☆108Updated 9 months ago
- Forensic Artifact Collection Tool Matrix☆92Updated last year
- Pointing cybersecurity teams to thousands of detection rules and offensive security tests aligned with common attacker techniques☆141Updated last year
- Curated Windows event log Sigma rules used in Hayabusa and Velociraptor.☆212Updated 3 weeks ago
- Dettectinator - The Python library to your DeTT&CT YAML files.☆119Updated 9 months ago
- ☆101Updated last month
- A repository of my own Sigma detection rules.☆163Updated last month
- Sigma rule specification☆164Updated last month
- This repository is for Indicators of Compromise (IOCs) from Zscaler ThreatLabz public reports☆76Updated last month
- Intel Retrieval Augmented Generation (RAG) Utilities☆91Updated last year
- A Jupyter notebook to assist with the analysis of the output generated from Volatility memory extraction framework.☆97Updated 2 years ago
- A pySigma wrapper to manage detection rules.☆43Updated last week
- Active C&C Detector☆155Updated 2 years ago
- Awesome Splunk SPL hunt queries that can be used to detect the latest vulnerability exploitation attempts & subsequent compromise☆67Updated last year