SigmaHQ / sigma-rules-validator
Validates Sigma rules using the JSON schema
☆15Updated 10 months ago
Alternatives and similar repositories for sigma-rules-validator:
Users that are interested in sigma-rules-validator are comparing it to the libraries listed below
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆75Updated last year
- A specification and style guide for YARA rules☆44Updated 11 months ago
- A pySigma wrapper and langchain toolkit for automatic rule creation/translation☆73Updated last week
- A repository to share publicly available Velociraptor detection content☆124Updated this week
- pySigma Splunk backend☆35Updated last week
- CarbonBlack EDR detection rules and response actions☆71Updated 4 months ago
- Open Threat-Informed Detection Engineering☆32Updated 3 weeks ago
- A pySigma wrapper to manage detection rules.☆34Updated last month
- ShellSweeping the evil.☆52Updated 7 months ago
- 100 Days of YARA to be updated with rules & ideas as the year progresses☆58Updated 2 years ago
- YARA rule analyzer to improve rule quality and performance☆96Updated last month
- Remote access and Antivirus Logging Database☆43Updated 9 months ago
- Jupyter Notebooks for Cyber Threat Intelligence☆35Updated last year
- Tools and scripts to deploy and manage OpenRelik instances☆12Updated last month
- Small-scale threat emulation and detection range built on Elastic and Atomic Redteam.☆36Updated last year
- USN Journal full path builder☆54Updated 4 months ago
- The core backend server handling API requests and task management☆34Updated last week
- This repository contains sample log data that were collected after running adversary simulations in Microsoft 365☆20Updated 3 months ago
- Memory Baseliner is a script that can compare two windows memory images or perform frequency of occurrence / data stacking analysis on mu…☆50Updated last year
- ☆16Updated last month
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆35Updated last month
- Project based on RegRipper, to extract add'l value/pivot points from TLN events file☆82Updated last week
- ☆20Updated 2 years ago
- Threat Simulation Indexes☆37Updated 3 weeks ago
- Script to automate Linux live evidence collection☆27Updated 2 years ago
- A running list of Windows sources and the related event ids.☆19Updated last year
- Active C&C Detector☆152Updated last year
- Knowing which rule should trigger according to the redcannary test☆11Updated 2 months ago
- Ideas for projects for defensive research or blue teaming☆10Updated last year
- Augmentation to Machine Readable CTI☆27Updated last month