SigmaHQ / pySigma-backend-insightidrView external linksLinks
☆15Aug 29, 2025Updated 5 months ago
Alternatives and similar repositories for pySigma-backend-insightidr
Users that are interested in pySigma-backend-insightidr are comparing it to the libraries listed below
Sorting:
- ☆13Feb 6, 2018Updated 8 years ago
- Threat Detection System using Hybrid (Machine Learning + Lexical Analysis) learning Approach.☆11May 30, 2017Updated 8 years ago
- A GAS web-app to manage pfSense FW rules from a Google Sheets spreadsheet☆19Mar 20, 2023Updated 2 years ago
- Look into EDR events from network☆25Nov 20, 2025Updated 2 months ago
- A curated list of resources to deep dive into the intersection of applied machine learning and threat detection.☆19Sep 23, 2020Updated 5 years ago
- Repo of python/bash scripts for identifying IoC's in threat feed and other online tools☆26Jul 27, 2020Updated 5 years ago
- This repository contains OpenIOC rules to aid in hunting for indicators of compromise and TTPs focused on Advanced Persistent Threat grou…☆26Oct 3, 2023Updated 2 years ago
- Community content for LogRhythm Axon. Includes Dashboards, searches, analytics rules, processing policies and more.☆10Jul 26, 2024Updated last year
- One Day of Python for SaintCon 2022☆11Jan 3, 2023Updated 3 years ago
- Small-scale threat emulation and detection range built on Elastic and Atomic Redteam.☆39Dec 17, 2025Updated last month
- CMS Detection and Exploitation suite - Scan WordPress, Joomla, Drupal and over 170 other CMSs☆30Jun 13, 2019Updated 6 years ago
- STIX 2.1 Visualizer, Attack and Activity Thread Graph for Threat Modeling☆33Dec 9, 2024Updated last year
- The Console Monitor Driver is a KMDF kernel-mode filter driver that captures certain Fast I/O operations (input and output) that is sent …☆41Sep 6, 2022Updated 3 years ago
- ☆48Feb 1, 2026Updated 2 weeks ago
- Collection of scripts/resources/ideas for attack surface reduction and additional logging to enable better threat hunting on Windows endp…☆38Apr 5, 2024Updated last year
- Azure Deployment Templates for Mandiant Managed Huning☆12Jun 1, 2023Updated 2 years ago
- Tool to extract Sessions, MessageID(s) and find the emails belonging to MessageID(s). This script utilizes the MailItemsAccessed features…☆41Oct 20, 2020Updated 5 years ago
- Framework for Monitoring File Ingestion Source for Yara Matches☆50Mar 10, 2025Updated 11 months ago
- Some YARA rules i will add from time to time☆12May 31, 2019Updated 6 years ago
- Sample data generator for the Splunk for Palo Alto Networks app.☆12Sep 25, 2016Updated 9 years ago
- This is a script to import Cisco Talos's IP Blacklist into a Tag (Host Group) within Stealthwatch. This will also optionally create a Cu…☆11May 22, 2023Updated 2 years ago
- Project that creates a Kubernetes environment in Azure (AKS) and protects it with CloudGuard CSPM / Workload and Appsec technologies☆10Jun 12, 2023Updated 2 years ago
- The dataset was used as a support to attack obfuscations. It is the largest obfuscated dataset, with realistic and various binaries and f…☆19Jan 15, 2026Updated last month
- Queries from the blog posts.☆15Oct 6, 2024Updated last year
- The Eureka Lab Series is designed for learners at all levels of experience and interest in security concepts and technologies.☆10Nov 30, 2025Updated 2 months ago
- Collection of Suricata rule sets that I use modified to my environments.☆39Sep 13, 2020Updated 5 years ago
- A few scripts I put together for testing purposes and to automate a few capabilities while doing IR. These scripts are also part of my bl…☆56Jan 24, 2018Updated 8 years ago
- Active Response plugin. Osquery to execute wazuh/ossec active response plugins. You can write your own plugins, easy to plug☆11Jun 20, 2020Updated 5 years ago
- Font Awesome for Django☆12Dec 27, 2021Updated 4 years ago
- Messing with the National Rail API☆13Sep 15, 2018Updated 7 years ago
- ☆16Updated this week
- GUI for regripper☆11Mar 19, 2019Updated 6 years ago
- Offline Active Directory Domain Services (AD DS) Join☆12Jan 4, 2017Updated 9 years ago
- Tools for hunting security threats☆12Feb 4, 2020Updated 6 years ago
- ☆12Nov 28, 2023Updated 2 years ago
- 🦉🔬A small PowerShell tool for finding information quickly on malicious IPs or FQDNs. Powershell threat hunting.☆11Jan 9, 2020Updated 6 years ago
- A fast pure-Python search engine☆12Apr 9, 2009Updated 16 years ago
- Build your own threat hunting maturity model☆11Oct 29, 2017Updated 8 years ago
- HoneyDB Python Module☆14Feb 6, 2024Updated 2 years ago