☆34Oct 16, 2025Updated 6 months ago
Alternatives and similar repositories for sigma-rules-crawler
Users that are interested in sigma-rules-crawler are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A complete system to deploy functional Honeypots to all infrastructures that needs to be notified when something anomalous occur☆10Feb 8, 2022Updated 4 years ago
- Safed for Linux☆14Jul 5, 2019Updated 6 years ago
- Can you pay the ransom in your country?☆14Dec 18, 2023Updated 2 years ago
- ATOP formally A ton of Privacy, a swissarmyknife for investigations on TON blockchain.☆25Jul 29, 2024Updated last year
- Mitre ATT&CK and Suricata Rules Automation with AI & LLM☆14Sep 28, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Rules Shared by the Community from 100 Days of YARA 2023 -☆18Apr 10, 2023Updated 3 years ago
- Collection of malware ioc hashes from blog posts. A Python script is provided to search through it.☆19Sep 10, 2020Updated 5 years ago
- Random Log Generation☆28Jan 12, 2024Updated 2 years ago
- Tornado☆89Apr 22, 2026Updated last week
- Transform EQL detection rules to VQL artifacts☆12Nov 12, 2021Updated 4 years ago
- Query.AI plugin for Kibana☆13Nov 10, 2019Updated 6 years ago
- Kestrel Jupyter Notebook Kernel☆10Oct 19, 2023Updated 2 years ago
- Elasticsearch/Kibana environment and log data for Sigma workshop☆27Dec 20, 2019Updated 6 years ago
- ☆13Apr 8, 2022Updated 4 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Filebeat module for Squid access.log + Kibana dashboards. ELK 7.x☆17Sep 19, 2020Updated 5 years ago
- curl based tool to send messages using Microsoft Exchange ActiveSync protocol☆11Oct 18, 2019Updated 6 years ago
- Aggregated ATT&CK technique reporting data. Presented at Splunk GovSummit December 2022☆17Jul 18, 2025Updated 9 months ago
- "Deep Packet Inspection as a Service" (CoNEXT '14)☆16Mar 30, 2017Updated 9 years ago
- This repository contains a few examples of actions that can be added to rules within Elastic Security.☆24Feb 6, 2025Updated last year
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Apr 10, 2020Updated 6 years ago
- defender_database☆25Oct 31, 2023Updated 2 years ago
- Automated detection rule analysis utility☆29Sep 22, 2022Updated 3 years ago
- Keklick - C2 Hunting, Reporting and Visualization Tool☆63Jul 23, 2025Updated 9 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- incident response scripts☆18Mar 4, 2019Updated 7 years ago
- SIEGMA - Transform Sigma rules into SIEM consumables☆159Mar 10, 2025Updated last year
- ☆11Feb 19, 2024Updated 2 years ago
- Maltego transformation for TON investigations☆24Jan 1, 2024Updated 2 years ago
- Plugin files for editing K files☆12Aug 20, 2024Updated last year
- Listing releases of the Elastic stack with new features and references☆19Feb 4, 2026Updated 3 months ago
- RDP Checker☆65Feb 23, 2024Updated 2 years ago
- ☆13May 27, 2020Updated 5 years ago
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆70Feb 3, 2022Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A repository of my own Sigma detection rules.☆165Nov 25, 2025Updated 5 months ago
- Website crawler with YARA detection☆90Aug 20, 2023Updated 2 years ago
- Pulls IOCs from MISP and adds the to reference sets in QRadar☆33Apr 20, 2023Updated 3 years ago
- IOCs for various malware families☆11Jul 18, 2024Updated last year
- The Project can be used to integrate QRadar with MISP Threat Sharing Platform☆40May 18, 2022Updated 3 years ago
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆51Mar 2, 2022Updated 4 years ago
- SwaraVM is a mobile security virtual machine that aggregates tools and resources that are commonly used for network traffic analysis, mal…☆32Aug 6, 2019Updated 6 years ago