These are open source rules that can be utilized with QRadar to detect various types of threats in the environment.
☆59Jun 11, 2019Updated 6 years ago
Alternatives and similar repositories for QRCE-Rules
Users that are interested in QRCE-Rules are comparing it to the libraries listed below
Sorting:
- Integrate IBM QRadar and RPA to automate security L1 tasks.☆14May 20, 2022Updated 3 years ago
- Scripts to automatically import threat intel into QRadar☆14Jun 20, 2019Updated 6 years ago
- Monitor device events using QRadar☆22Sep 17, 2025Updated 5 months ago
- Pulls IOCs from MISP and adds the to reference sets in QRadar☆34Apr 20, 2023Updated 2 years ago
- The Project can be used to integrate QRadar with MISP Threat Sharing Platform☆40May 18, 2022Updated 3 years ago
- This repository bundles various utilities and scripts I built for use with IBM QRadar SIEM☆16Jan 30, 2026Updated last month
- “Intelliroot Code Injection Hunter” is a tool that can to help you identify injected malicious code. The tool can identify and extract po…☆16Sep 21, 2022Updated 3 years ago
- Scripts and lists to help generate YARA friendly string mutations☆22Apr 9, 2023Updated 2 years ago
- Threat Detection & Anomaly Detection rules for popular open-source components☆53Jul 27, 2022Updated 3 years ago
- ☆19Oct 23, 2020Updated 5 years ago
- ☆58Sep 17, 2025Updated 5 months ago
- This is a Ansible script for building a ready to go Cuckoo Sandbox server.☆26Mar 22, 2018Updated 7 years ago
- ProcessBouncer is a simple but effective tool for blocking malware with a process-based approach. With a little fine-tuning this allows t…☆25Apr 9, 2021Updated 4 years ago
- QRadar Export the rule set for printing☆23Oct 23, 2017Updated 8 years ago
- Repository for SPEED SIEM Use Case Framework☆60May 2, 2020Updated 5 years ago
- MCP use case for SecOps automation w/ Splunk,CrowdStrike EDR, MISP☆21Jul 7, 2025Updated 8 months ago
- Samples of visualization add-ons to QRadar, utilizing public REST APIs☆33May 17, 2016Updated 9 years ago
- Example scripts and rules for use in Resilient playbooks.☆35Dec 15, 2023Updated 2 years ago
- Collection of scripts/resources/ideas for attack surface reduction and additional logging to enable better threat hunting on Windows endp…☆38Apr 5, 2024Updated last year
- Repo Filled With Follow Along Guides☆80Jun 8, 2022Updated 3 years ago
- List of PowerShell commands and commandlets that should be in your Powershel watchlist☆38Jul 22, 2021Updated 4 years ago
- Code to Scraping some portion of Data from forum(RaidForums[seized by FBI]) with Python SCRAPY spiders bypassing recaptcha and storing to…☆10Feb 25, 2021Updated 5 years ago
- Chrome Extension☆14Oct 24, 2022Updated 3 years ago
- This is a script to import Cisco Talos's IP Blacklist into a Tag (Host Group) within Stealthwatch. This will also optionally create a Cu…☆11May 22, 2023Updated 2 years ago
- Incognito Proxy chrome extension☆10Sep 27, 2023Updated 2 years ago
- Postman collections for interacting with Cisco Stealthwatch Enterprise APIs☆10Apr 26, 2023Updated 2 years ago
- Python client for McAfee ePolicy Orchestrator☆15Mar 12, 2021Updated 4 years ago
- QRadar AQL backend for converting Sigma rules to QRadar AQL queries☆14Sep 18, 2025Updated 5 months ago
- ☆11Aug 15, 2024Updated last year
- This repository is a collection of notes, links, tutorials, and experiences aimed at helping others. If you find it useful, please consid…☆19Jun 24, 2025Updated 8 months ago
- The PT tracing portion of Barnum.☆11Feb 8, 2019Updated 7 years ago
- ☆12Nov 14, 2023Updated 2 years ago
- Recordization library☆11Feb 27, 2026Updated last week
- SIEM Visibility assessment☆14May 22, 2023Updated 2 years ago
- Twitter Search to Cisco Threat Response Casebook [v1.0]☆15Dec 8, 2022Updated 3 years ago
- OpenCorsairLighting☆12Nov 1, 2019Updated 6 years ago
- Back to the Whiteboard: a Principled Approach for the Assessment and Design of Memory Forensic Techniques (Usenix '19)☆14Aug 16, 2019Updated 6 years ago
- Repo contains code for our DerbyCon 2016 talk comparing Binary Ninja and IDA Pro.☆10Sep 18, 2016Updated 9 years ago
- A curated list of awesome threat detection and hunting resources☆10Mar 23, 2018Updated 7 years ago