SigmaHQ / sigma-rules-validatorLinks
Validates Sigma rules using the JSON schema
☆22Updated last year
Alternatives and similar repositories for sigma-rules-validator
Users that are interested in sigma-rules-validator are comparing it to the libraries listed below
Sorting:
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆86Updated last month
- A pySigma wrapper to manage detection rules.☆44Updated 2 weeks ago
- A pySigma wrapper and langchain toolkit for automatic rule creation/translation☆91Updated 3 months ago
- YARA rule analyzer to improve rule quality and performance☆110Updated 3 weeks ago
- A specification and style guide for YARA rules☆66Updated last year
- Small-scale threat emulation and detection range built on Elastic and Atomic Redteam.☆39Updated last month
- ShellSweeping the evil.☆53Updated last year
- Intel Retrieval Augmented Generation (RAG) Utilities☆91Updated 2 years ago
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆55Updated this week
- Sigma rules to share with the community☆124Updated last year
- Jupyter Notebooks for Cyber Threat Intelligence☆35Updated 2 years ago
- Threat Simulation Indexes☆39Updated last month
- The backend server handling API requests and task management☆55Updated this week
- Convert Sigma rules to SIEM queries, directly in your browser.☆109Updated 2 weeks ago
- Detection Engineering with YARA☆87Updated 2 years ago
- This repository contains sample log data that were collected after running adversary simulations in Microsoft 365☆23Updated last year
- JPCERT/CC public YARA rules repository☆110Updated 2 months ago
- Rules shared by the community from 100 Days of YARA 2025☆38Updated last month
- A home for detection content developed by the delivr.to team☆73Updated 5 months ago
- FJTA (Forensic Journal Timeline Analyzer) is a tool that analyzes Linux filesystem (ext4, XFS) journals (not systemd-journald logs), gene…☆103Updated 3 weeks ago
- Active C&C Detector☆155Updated 2 years ago
- Adversarial Interception Mission Oriented Discovery and Disruption Framework, or AIMOD2, is a structured threat hunting approach to proac…☆90Updated 2 years ago
- ☆78Updated 4 months ago
- OSSEM Data Dictionaries☆65Updated last year
- A repository of my own Sigma detection rules.☆163Updated 2 months ago
- Collects a listing of MITRE ATT&CK Techniques, then discovers Splunk ESCU detections for each technique☆69Updated last year
- Your Browser-based EVTX Companion☆112Updated this week
- ☆65Updated 3 years ago
- ☆17Updated 3 months ago
- ☆101Updated 2 months ago