These are open source rules that can be utilized with QRadar to detect various types of threats in the environment.
☆59Jun 11, 2019Updated 6 years ago
Alternatives and similar repositories for QRCE-Rules
Users that are interested in QRCE-Rules are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Monitor device events using QRadar☆22Sep 17, 2025Updated 7 months ago
- Scripts to automatically import threat intel into QRadar☆14Jun 20, 2019Updated 6 years ago
- NHSuite allows users to efficiently manage their QRadar Network Hierarchy. Utilizing the provided QRadar API, users can seamlessly export…☆26Jan 22, 2024Updated 2 years ago
- Unofficial third-party scripts, playbooks, and content for IBM QRadar & QRadar Community Edition.☆87May 8, 2025Updated last year
- Pulls IOCs from MISP and adds the to reference sets in QRadar☆33Apr 20, 2023Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- These workflows are provided for sample usage, new submissions and updates from the community, and are NOT supported by IBM.☆51Apr 20, 2026Updated 2 weeks ago
- This is the One Stop place where you can several Detection Rules which can help you to kick start your journey on SIEM, SOC work.☆43Jun 27, 2021Updated 4 years ago
- Basic log analysis tool to detect impossible travel via IP address geographic information☆20Apr 29, 2019Updated 7 years ago
- Threat Detection & Anomaly Detection rules for popular open-source components☆53Jul 27, 2022Updated 3 years ago
- A collection of Sigma rules organized by MITRE ATT&CK technique☆18Apr 1, 2026Updated last month
- Collection of scripts/resources/ideas for attack surface reduction and additional logging to enable better threat hunting on Windows endp…☆38Apr 5, 2024Updated 2 years ago
- Provides an advanced baseline to implement a secure Windows auditing strategy on Windows OS.☆67Feb 22, 2026Updated 2 months ago
- The Project can be used to integrate QRadar with MISP Threat Sharing Platform☆40May 18, 2022Updated 3 years ago
- Volatility plugin to search for all Autostart Extensibility Points (AESPs)☆10May 16, 2024Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆10Jan 23, 2023Updated 3 years ago
- A PowerShell script for helping to find vulnerable settings in AD Group Policy.☆16Jan 8, 2019Updated 7 years ago
- Set of SIGMA rules (>350) mapped to MITRE ATT&CK tactic and techniques☆428Nov 8, 2025Updated 6 months ago
- HoneyPot Orchestration☆11Aug 3, 2023Updated 2 years ago
- A series of cloud focused KQL queries for threat hunting and DFIR☆12Oct 21, 2025Updated 6 months ago
- Automated Penetration Testing Framework - Open-Source Vulnerability Scanner - Vulnerability Management☆18Jan 24, 2024Updated 2 years ago
- Repo Filled With Follow Along Guides☆81Jun 8, 2022Updated 3 years ago
- Repository for SPEED SIEM Use Case Framework☆60May 2, 2020Updated 6 years ago
- Helping Incident Responders hunt for potential persistence mechanisms on UNIX-based systems.☆17Oct 28, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- All about ransomware notes and extension files.☆14Aug 26, 2023Updated 2 years ago
- Example scripts and rules for use in Resilient playbooks.☆35Dec 15, 2023Updated 2 years ago
- ☆59Sep 17, 2025Updated 7 months ago
- Security event correlation engine for ELK stack☆447Jun 26, 2024Updated last year
- Download a list of suspected malicious IPs and Domains. Create a QRadar Reference Set. Search Your Environment For Malicious IPs☆69Aug 13, 2021Updated 4 years ago
- Dockerized deployment of Polr URL shortener☆10Mar 15, 2022Updated 4 years ago
- Recovered samples, extracted Wasm/binaries, decoded payloads & analysis scripts from the Coruna iOS/macOS exploit kit (b27.icu). 28 JS mo…☆56Updated this week
- A web scraper to create MISP events and reports☆17Updated this week
- ☆16Oct 29, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Google Cloud Security Command Center to Azure Sentinel Connector☆18Jul 15, 2023Updated 2 years ago
- not an exploit or a poc☆16Apr 15, 2022Updated 4 years ago
- QRadar Export the rule set for printing☆23Oct 23, 2017Updated 8 years ago
- Postman collections for interacting with Cisco Stealthwatch Enterprise APIs☆10Apr 26, 2023Updated 3 years ago
- QRadar AQL backend for converting Sigma rules to QRadar AQL queries☆14Sep 18, 2025Updated 7 months ago
- Windows HTTP协议栈远程代码执行漏洞 CVE-2021-31166☆19Nov 4, 2021Updated 4 years ago
- Useful resources about phishing email analysis☆86Jan 31, 2025Updated last year