Yamato-Security / hayabusa-rules
Curated Windows event log Sigma rules used in Hayabusa and Velociraptor.
☆166Updated this week
Alternatives and similar repositories for hayabusa-rules:
Users that are interested in hayabusa-rules are comparing it to the libraries listed below
- Rules generated from our investigations.☆192Updated last week
- Sample evtx files to use for testing hayabusa detection rules☆51Updated 4 months ago
- Harness the power of Splunk for your investigations☆95Updated 2 weeks ago
- Set of SIGMA rules (>350) mapped to MITRE ATT&CK tactic and techniques☆355Updated 2 months ago
- A repository of my own Sigma detection rules.☆157Updated 6 months ago
- Sigma rules to share with the community☆119Updated 2 months ago
- ☆124Updated last month
- A repository to share publicly available Velociraptor detection content☆139Updated this week
- An opensource sigma conversion tool built using pysigma☆121Updated 3 months ago
- Takajō (鷹匠) is a Hayabusa results analyzer.☆111Updated this week
- Pointing cybersecurity teams to thousands of detection rules and offensive security tests aligned with common attacker techniques☆132Updated last year
- This repository contains helper scripts and custom configs to get the best out of Google's Timesketch project.☆108Updated last year
- Automated YARA Rule Standardization and Quality Assurance Tool☆200Updated last week
- Sigma rules from Joe Security☆207Updated 4 months ago
- Welcome to the SEKOIA.IO Community repository!☆143Updated 2 weeks ago
- OSSEM Detection Model☆177Updated 2 years ago
- Set of EVTX samples (>270) mapped to MITRE ATT&CK tactic and techniques to measure your SIEM coverage or developed new use cases.☆559Updated 2 months ago
- An IDE and translation engine for detection engineers and threat hunters. Be faster, write smarter, keep 100% privacy.☆146Updated last month
- A community-driven repository for threat hunting ideas, methodologies, and research that serves as a central gathering place for hunters …☆217Updated 2 weeks ago
- A standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logs☆705Updated last month
- Awesome list of keywords and artifacts for Threat Hunting sessions☆554Updated last month
- ☆67Updated last month
- ☆195Updated last year
- Active C&C Detector☆153Updated last year
- LOKI2 - Simple IOC and YARA Scanner☆88Updated 8 months ago
- Anything Sysmon related from the MSTIC R&D team☆151Updated 9 months ago
- LotL RMM☆152Updated last week
- A python script developed to process Windows memory images based on triage type.☆261Updated last year
- yara detection rules for hunting with the threathunting-keywords project☆115Updated last month
- A collection of files with indicators supporting social media posts from Palo Alto Network's Unit 42 team to disseminate timely threat in…☆276Updated last week