These are open source rules that can be utilized with QRadar to detect various types of threats in the environment.
☆59Jun 11, 2019Updated 6 years ago
Alternatives and similar repositories for QRCE-Rules
Users that are interested in QRCE-Rules are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Integrate IBM QRadar and RPA to automate security L1 tasks.☆14May 20, 2022Updated 3 years ago
- Monitor device events using QRadar☆22Sep 17, 2025Updated 7 months ago
- Scripts to automatically import threat intel into QRadar☆14Jun 20, 2019Updated 6 years ago
- Unofficial third-party scripts, playbooks, and content for IBM QRadar & QRadar Community Edition.☆87May 8, 2025Updated 11 months ago
- Pulls IOCs from MISP and adds the to reference sets in QRadar☆34Apr 20, 2023Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- This repository bundles various utilities and scripts I built for use with IBM QRadar SIEM☆16Jan 30, 2026Updated 2 months ago
- These workflows are provided for sample usage, new submissions and updates from the community, and are NOT supported by IBM.☆51Updated this week
- This is the One Stop place where you can several Detection Rules which can help you to kick start your journey on SIEM, SOC work.☆43Jun 27, 2021Updated 4 years ago
- ☆19Oct 23, 2020Updated 5 years ago
- Threat Detection & Anomaly Detection rules for popular open-source components☆53Jul 27, 2022Updated 3 years ago
- Watsonx Orchestrate and Maximo Application Suite reference architecture for the creation and integration of a Maximo AI Assistant.☆12Sep 18, 2025Updated 7 months ago
- “Intelliroot Code Injection Hunter” is a tool that can to help you identify injected malicious code. The tool can identify and extract po…☆16Sep 21, 2022Updated 3 years ago
- Scripts and lists to help generate YARA friendly string mutations☆22Apr 9, 2023Updated 3 years ago
- vim, xmonad, xmobar, bashrc, bash profile and inits☆18Apr 7, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Provides an advanced baseline to implement a secure Windows auditing strategy on Windows OS.☆67Feb 22, 2026Updated last month
- Volatility plugin to search for all Autostart Extensibility Points (AESPs)☆10May 16, 2024Updated last year
- ☆10Jan 23, 2023Updated 3 years ago
- ☆15Nov 4, 2020Updated 5 years ago
- Set of SIGMA rules (>350) mapped to MITRE ATT&CK tactic and techniques☆422Nov 8, 2025Updated 5 months ago
- HoneyPot Orchestration☆11Aug 3, 2023Updated 2 years ago
- A series of cloud focused KQL queries for threat hunting and DFIR☆12Oct 21, 2025Updated 5 months ago
- Incognito Proxy chrome extension☆10Sep 27, 2023Updated 2 years ago
- Automated Penetration Testing Framework - Open-Source Vulnerability Scanner - Vulnerability Management☆18Jan 24, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A repository to share contributions related to TheHive Project☆22Sep 15, 2021Updated 4 years ago
- Repository for SPEED SIEM Use Case Framework☆60May 2, 2020Updated 5 years ago
- Helping Incident Responders hunt for potential persistence mechanisms on UNIX-based systems.☆17Oct 28, 2023Updated 2 years ago
- This is a script to import Cisco Talos's IP Blacklist into a Tag (Host Group) within Stealthwatch. This will also optionally create a Cu…☆11May 22, 2023Updated 2 years ago
- All about ransomware notes and extension files.☆14Aug 26, 2023Updated 2 years ago
- Example scripts and rules for use in Resilient playbooks.☆35Dec 15, 2023Updated 2 years ago
- ☆59Sep 17, 2025Updated 7 months ago
- IBM Cloud Functions workshops for Developers☆20Sep 17, 2025Updated 7 months ago
- Security event correlation engine for ELK stack☆447Jun 26, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Python client for McAfee ePolicy Orchestrator☆15Mar 12, 2021Updated 5 years ago
- Download a list of suspected malicious IPs and Domains. Create a QRadar Reference Set. Search Your Environment For Malicious IPs☆69Aug 13, 2021Updated 4 years ago
- Recovered samples, extracted Wasm/binaries, decoded payloads & analysis scripts from the Coruna iOS/macOS exploit kit (b27.icu). 28 JS mo…☆53Mar 9, 2026Updated last month
- iOS 18.4-18.6.2 userland exploit chain with JS injection into SpringBoard and other processes. Derived from DarkSword.☆42Apr 11, 2026Updated last week
- A web scraper to create MISP events and reports☆17Jun 30, 2025Updated 9 months ago
- not an exploit or a poc☆16Apr 15, 2022Updated 4 years ago
- Postman collections for interacting with Cisco Stealthwatch Enterprise APIs☆10Apr 26, 2023Updated 2 years ago