A simple linter for Sigma rules
☆13Oct 22, 2020Updated 5 years ago
Alternatives and similar repositories for sigmalint
Users that are interested in sigmalint are comparing it to the libraries listed below
Sorting:
- DFF (Digital Forensics Framework)☆11Jan 6, 2021Updated 5 years ago
- A linter for ksy files.☆11Aug 15, 2021Updated 4 years ago
- Golang io/fs implementation for Google Cloud Storage☆12Jan 20, 2024Updated 2 years ago
- Kaitai Struct YAML (KSY) schema specification☆15Sep 12, 2025Updated 5 months ago
- Simple drag and drop using native event API for Vue 3☆13Nov 13, 2023Updated 2 years ago
- This package provides an S3 implementation for Go1.16 filesystem interface.☆13Apr 21, 2025Updated 10 months ago
- API for parsing binary files using a predefined grammar☆15Nov 17, 2016Updated 9 years ago
- Go package to perform common cryptanalysis functions.☆15Sep 23, 2017Updated 8 years ago
- JSON schemas for validating CACAO Security Playbooks. Note: In December 2023, Cyentific AS offered and transferred the content of this re…☆19Dec 15, 2023Updated 2 years ago
- kaitaigo is a compiler and runtime to create Go parsers from Kaitai Struct files☆18Apr 20, 2022Updated 3 years ago
- 📚 A collection of tools and libraries to parse filesystems, archives and other data types☆22Oct 20, 2024Updated last year
- OWASP Foundation web repository☆21Jan 7, 2026Updated last month
- AFF4 Standard Documents☆29Feb 4, 2022Updated 4 years ago
- stix-icons is a collection of colourful and clean icons for use in software, training and marketing material to visualize cyber threats a…☆38Dec 15, 2022Updated 3 years ago
- Stemmer packages for Go programming language. Includes English, German and Dutch stemmers.☆54Dec 7, 2016Updated 9 years ago
- A specialized implementation of the Hierarchical Navigable Small World (HNSW) data structure adapted for efficient nearest neighbor looku…☆10Jan 26, 2026Updated last month
- Read a tar file contents using go1.16 io/fs abstraction☆47Nov 20, 2023Updated 2 years ago
- linux c++, fox-toolkit, multi-threaded forensic gui tool☆49Jul 19, 2024Updated last year
- NDISPktScan is a plugin for the Volatility Framework. It parses the Ethernet packets stored by ndis.sys in Windows kernel space memory.☆12Oct 23, 2015Updated 10 years ago
- Implements Go's (golang) io/fs filesystem interface by merging other io/fs instances.☆42Feb 22, 2024Updated 2 years ago
- Deploying an Nginx server on Digital Ocean using Vagrant and Salt☆23Aug 25, 2013Updated 12 years ago
- CLI generator for Velociraptor offline collector☆16Oct 10, 2025Updated 4 months ago
- Auxiliary scripts for Incident Response with ELK☆11Oct 7, 2015Updated 10 years ago
- Python wrapper for the TransIP API. It allows you to create, read and update resources on TransIP with ease using Python.☆11Mar 22, 2023Updated 2 years ago
- ☆11Mar 21, 2020Updated 5 years ago
- Basic document db from scratch in Go☆48Apr 2, 2022Updated 3 years ago
- The Python implementation of the AFF4 standard.☆45Nov 13, 2025Updated 3 months ago
- ☆17Jul 16, 2024Updated last year
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Jul 5, 2021Updated 4 years ago
- A privacy-aware exchange module to securely and privately share your indicators☆14Aug 23, 2017Updated 8 years ago
- Portable Activity Timeline that draws the Timeline based on data given in JSON or CSV format. By clicking on any activity a detailed moda…☆12Apr 6, 2023Updated 2 years ago
- DEFCON 33 Workshop - Open Source Malware 101 - Everything you always wanted to know about npm malware (and more)☆15Aug 8, 2025Updated 6 months ago
- Create a malicious pip package (PoC)☆12Sep 14, 2023Updated 2 years ago
- ASCII version of the classic card game Spite and Malice.☆11Jun 26, 2017Updated 8 years ago
- A homebrewed cyber threat intelligence solution☆20Nov 20, 2012Updated 13 years ago
- Incident Response automation scripts☆16Sep 5, 2025Updated 5 months ago
- CyLR - Live Response Collection Tool☆10Jul 14, 2020Updated 5 years ago
- Python API for interacting with sigma rules.☆54Jul 1, 2022Updated 3 years ago
- A PowerShell module for querying the National Vulnerability Database☆24May 2, 2024Updated last year