Yamato-Security / hayabusa-rules
Curated Windows event log Sigma rules used in Hayabusa and Velociraptor.
☆177Updated this week
Alternatives and similar repositories for hayabusa-rules
Users that are interested in hayabusa-rules are comparing it to the libraries listed below
Sorting:
- Harness the power of Splunk for your investigations☆105Updated this week
- Sample evtx files to use for testing hayabusa detection rules☆54Updated 6 months ago
- Takajō (鷹匠) is a Hayabusa results analyzer.☆117Updated last week
- Rules generated from our investigations.☆195Updated last month
- ☆130Updated last week
- Set of SIGMA rules (>350) mapped to MITRE ATT&CK tactic and techniques☆357Updated 4 months ago
- Automated YARA Rule Standardization and Quality Assurance Tool☆218Updated this week
- An IDE and translation engine for detection engineers and threat hunters. Be faster, write smarter, keep 100% privacy.☆153Updated 2 months ago
- An opensource sigma conversion tool built using pysigma☆126Updated 4 months ago
- A repository of my own Sigma detection rules.☆158Updated 8 months ago
- A repository to share publicly available Velociraptor detection content☆163Updated this week
- Sigma rule specification☆134Updated 2 months ago
- Sigma rules to share with the community☆121Updated 3 months ago
- ☆195Updated last year
- This repository contains helper scripts and custom configs to get the best out of Google's Timesketch project.☆109Updated last year
- A standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logs☆712Updated last month
- Pointing cybersecurity teams to thousands of detection rules and offensive security tests aligned with common attacker techniques☆132Updated last year
- OSSEM Detection Model☆177Updated 2 years ago
- Threat Hunting queries for various attacks☆234Updated this week
- The Sigma command line interface based on pySigma☆153Updated last month
- Sigma rules from Joe Security☆210Updated 6 months ago
- Anything Sysmon related from the MSTIC R&D team☆153Updated 11 months ago
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆202Updated 2 years ago
- A python script developed to process Windows memory images based on triage type.☆262Updated last year
- ☆69Updated 2 months ago
- MISP Playbooks☆199Updated 3 months ago
- Set of EVTX samples (>270) mapped to MITRE ATT&CK tactic and techniques to measure your SIEM coverage or developed new use cases.☆567Updated 4 months ago
- Welcome to the SEKOIA.IO Community repository!☆153Updated last month
- A community-driven repository for threat hunting ideas, methodologies, and research that serves as a central gathering place for hunters …☆251Updated last week
- A pySigma wrapper and langchain toolkit for automatic rule creation/translation☆80Updated this week