☆33Oct 16, 2025Updated 5 months ago
Alternatives and similar repositories for sigma-rules-crawler
Users that are interested in sigma-rules-crawler are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- NetEye 4 community repository to share monitoring templates, Plugin scripts and instructions to enhance some NetEye modules in an guided …☆18Dec 17, 2025Updated 3 months ago
- A complete system to deploy functional Honeypots to all infrastructures that needs to be notified when something anomalous occur☆10Feb 8, 2022Updated 4 years ago
- Safed for Linux☆14Jul 5, 2019Updated 6 years ago
- Can you pay the ransom in your country?☆14Dec 18, 2023Updated 2 years ago
- ATOP formally A ton of Privacy, a swissarmyknife for investigations on TON blockchain.☆24Jul 29, 2024Updated last year
- Linux post exploitation tool for info gathering and exfiltration 🐧📡💀☆94Nov 13, 2025Updated 4 months ago
- Knowing which rule should trigger according to the redcannary test☆11Nov 23, 2024Updated last year
- Mitre ATT&CK and Suricata Rules Automation with AI & LLM☆14Sep 28, 2024Updated last year
- Rules Shared by the Community from 100 Days of YARA 2023 -☆18Apr 10, 2023Updated 2 years ago
- Collection of malware ioc hashes from blog posts. A Python script is provided to search through it.☆19Sep 10, 2020Updated 5 years ago
- Random Log Generation☆28Jan 12, 2024Updated 2 years ago
- Query.AI plugin for Kibana☆13Nov 10, 2019Updated 6 years ago
- Elasticsearch/Kibana environment and log data for Sigma workshop☆26Dec 20, 2019Updated 6 years ago
- ☆13Apr 8, 2022Updated 3 years ago
- Filebeat module for Squid access.log + Kibana dashboards. ELK 7.x☆17Sep 19, 2020Updated 5 years ago
- Aggregated ATT&CK technique reporting data. Presented at Splunk GovSummit December 2022☆17Jul 18, 2025Updated 8 months ago
- "Deep Packet Inspection as a Service" (CoNEXT '14)☆16Mar 30, 2017Updated 8 years ago
- This repository contains a few examples of actions that can be added to rules within Elastic Security.☆24Feb 6, 2025Updated last year
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Apr 10, 2020Updated 5 years ago
- defender_database☆24Oct 31, 2023Updated 2 years ago
- Keklick - C2 Hunting, Reporting and Visualization Tool☆62Jul 23, 2025Updated 8 months ago
- incident response scripts☆18Mar 4, 2019Updated 7 years ago
- Elasticsearch Stack Overflow Vulnerability☆18Sep 23, 2023Updated 2 years ago
- SIEGMA - Transform Sigma rules into SIEM consumables☆159Mar 10, 2025Updated last year
- ☆11Feb 19, 2024Updated 2 years ago
- A script to create and assign SOP tasks into the cases☆20Aug 16, 2020Updated 5 years ago
- 🛝 Transforms any RCE into a functional dumb shell. Designed for constrained environments (e.g., firewalls) where traditional reverse she…☆14Feb 18, 2026Updated last month
- ☆13May 27, 2020Updated 5 years ago
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆70Feb 3, 2022Updated 4 years ago
- A repository of my own Sigma detection rules.☆164Nov 25, 2025Updated 3 months ago
- Website crawler with YARA detection☆89Aug 20, 2023Updated 2 years ago
- Pulls IOCs from MISP and adds the to reference sets in QRadar☆34Apr 20, 2023Updated 2 years ago
- IOCs for various malware families☆11Jul 18, 2024Updated last year
- The Project can be used to integrate QRadar with MISP Threat Sharing Platform☆40May 18, 2022Updated 3 years ago
- SwaraVM is a mobile security virtual machine that aggregates tools and resources that are commonly used for network traffic analysis, mal…☆32Aug 6, 2019Updated 6 years ago
- Anomaly detection in time series of graph data☆10Dec 3, 2013Updated 12 years ago
- Scan your AI/ML models for problems before you put them into production.☆11Mar 31, 2025Updated 11 months ago
- ☆15Jan 24, 2023Updated 3 years ago
- A dynamic checker for the ECF property incorporated into geth☆15Oct 27, 2017Updated 8 years ago