Validates Sigma rules using the JSON schema
☆22Mar 18, 2024Updated last year
Alternatives and similar repositories for sigma-rules-validator
Users that are interested in sigma-rules-validator are comparing it to the libraries listed below
Sorting:
- The home of the SDDLMaker☆28Jan 13, 2025Updated last year
- ☆15Sep 24, 2024Updated last year
- Official Website Of The Sigma Project☆21Feb 16, 2026Updated 2 weeks ago
- A framework and taxonomy for identifying, classifying, and reasoning about detection logic bugs in SIEM, EDR, and XDR rules, with concret…☆42Feb 22, 2026Updated last week
- Splunk Add-on for PowerShell provides field extraction for PowerShell event logs.☆17Feb 1, 2021Updated 5 years ago
- ☆17Oct 13, 2025Updated 4 months ago
- Cyber Threat Intelligence☆78Dec 7, 2025Updated 2 months ago
- intelligence-icons is a collection of icons and diagrams for building training and marketing materials around Intelligence sharing; inclu…☆41Mar 17, 2019Updated 6 years ago
- Convert Sigma rules to SIEM queries, directly in your browser.☆111Jan 24, 2026Updated last month
- A pySigma wrapper and langchain toolkit for automatic rule creation/translation☆92Nov 3, 2025Updated 4 months ago
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Jan 30, 2024Updated 2 years ago
- Generate Go bindings for shared C libraries.☆15Jul 13, 2024Updated last year
- Code Repository for Linux Troubleshooting Course with Real Life Examples, published by Packt☆12Jul 8, 2025Updated 7 months ago
- Activate Windows & Office 🔑☆13Jun 15, 2024Updated last year
- A small crappy script I wrote that converts the Sigma Windows Process Creation events to KQL via PySigma. Designed for CI/CD☆10Nov 7, 2023Updated 2 years ago
- This JavaScript CLI "undeletes' packages that have been removed from the NPM registry☆29Dec 18, 2025Updated 2 months ago
- KQL queries for Microsoft Defender Advanced Hunting organized around the TTPs of the MITRE ATT&CK framework.☆18Nov 7, 2024Updated last year
- Cobalt Strike notifications via NTFY.☆15Sep 24, 2024Updated last year
- A python SDK for accessing the Keymate-API☆13Jun 25, 2024Updated last year
- Indicators of compromise from to analysis and research by Nextron Threat Research team☆12Sep 17, 2025Updated 5 months ago
- Wireguard over TCP / HTTP using wstunnel for windows and linux☆11Feb 17, 2025Updated last year
- ☆42Sep 16, 2022Updated 3 years ago
- A group of ComfyUI nodes created by https://app.comflowy.com☆17Dec 3, 2024Updated last year
- Repository used for my master's thesis on implementing RVSDG as a dialect of MLIR☆13May 30, 2023Updated 2 years ago
- Generates a detailed CSV file containing Sigma Rules statistics for each service or category, and each level, offering a holistic view of…☆10Dec 22, 2023Updated 2 years ago
- A simple letsencrypt client in ruby☆10Apr 11, 2018Updated 7 years ago
- ☆15Feb 24, 2026Updated last week
- ☆14Jan 18, 2020Updated 6 years ago
- Opinionated Go Project Template☆13Updated this week
- ☆10Dec 28, 2015Updated 10 years ago
- Scans the filesystem for directories that are user-writeable☆13Jun 21, 2021Updated 4 years ago
- Atomic Red Team Simple Parser☆13Sep 21, 2018Updated 7 years ago
- The Hugr service☆27Feb 12, 2026Updated 2 weeks ago
- CVE-2025-64155: Fortinet FortiSIEM Argument Injection to Remote Code Execution☆31Jan 13, 2026Updated last month
- A small go harness that uses Ollama to orchestrate LLMs in a restricted process flow☆16Sep 10, 2024Updated last year
- Simple reverse ICMP shell☆14Apr 30, 2024Updated last year
- Recursively extract urls from a web page for reconnaissance.☆12Jun 9, 2024Updated last year
- MSI creator for exe setup/installer☆11Jun 27, 2023Updated 2 years ago
- ☆13Dec 15, 2025Updated 2 months ago