SimoneCagol / sigma-rules-crawler
☆29Updated last week
Alternatives and similar repositories for sigma-rules-crawler:
Users that are interested in sigma-rules-crawler are comparing it to the libraries listed below
- This repository contains OpenIOC rules to aid in hunting for indicators of compromise and TTPs focused on Advanced Persistent Threat grou…☆22Updated last year
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- pySigma Splunk backend☆35Updated last week
- Open Dataset of Cobalt Strike Beacon metadata (2018-2022)☆125Updated 2 years ago
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆75Updated last year
- pySigma Elasticsearch backend☆49Updated this week
- Library of threat hunts to get any user started!☆41Updated 4 years ago
- Threat Detection & Anomaly Detection rules for popular open-source components☆50Updated 2 years ago
- Automated detection rule analysis utility☆29Updated 2 years ago
- Threat Detection Rules (Snort/Sigma/Yara)☆13Updated last year
- An Adaptive Misuse Detection System☆34Updated 2 months ago
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆22Updated 2 months ago
- Create dataset for suricata with indicators of MISP instances and add sightings in MISP if an indicator of dataset generates an alert☆37Updated 2 years ago
- YARA rule analyzer to improve rule quality and performance☆96Updated last month
- Cyber Threat Intelligence Data, Indicators, and Analysis☆81Updated last month
- ☆64Updated last week
- Sample evtx files to use for testing hayabusa detection rules☆45Updated 2 months ago
- Look into EDR events from network☆23Updated 9 months ago
- Sensor Mappings to ATT&CK is a collection of resources to assist cyber defenders with understanding which sensors and events can help det…☆49Updated 7 months ago
- Detection Engineering with YARA☆87Updated last year
- Awesome Splunk SPL hunt queries that can be used to detect the latest vulnerability exploitation attempts & subsequent compromise☆60Updated 9 months ago
- Small web frontend for using openAI's GPT-3.5 and GPT-4's API☆52Updated 5 months ago
- A collection of tips for using MISP.☆74Updated last month
- This repository is for Indicators of Compromise (IOCs) from Zscaler ThreatLabz public reports☆66Updated 2 months ago
- Cyber Threats Detection Rules☆14Updated last month
- A MITRE Caldera plugin☆40Updated 2 months ago
- Placeholder for my detection repo and misc detection engineering content☆43Updated last year
- A pySigma wrapper and langchain toolkit for automatic rule creation/translation☆73Updated last week
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆104Updated 2 years ago
- Helping Incident Responders hunt for potential persistence mechanisms on UNIX-based systems.☆15Updated last year