Yamato-Security / hayabusa-rulesLinks
Curated Windows event log Sigma rules used in Hayabusa and Velociraptor.
☆185Updated last week
Alternatives and similar repositories for hayabusa-rules
Users that are interested in hayabusa-rules are comparing it to the libraries listed below
Sorting:
- Rules generated from our investigations.☆196Updated 3 weeks ago
- Automated YARA Rule Standardization and Quality Assurance Tool☆228Updated last week
- ☆136Updated 2 weeks ago
- Set of SIGMA rules (>350) mapped to MITRE ATT&CK tactic and techniques☆372Updated 6 months ago
- Welcome to the SEKOIA.IO Community repository!☆161Updated 2 weeks ago
- Harness the power of Splunk for your investigations☆116Updated 3 weeks ago
- An opensource sigma conversion tool built using pysigma☆131Updated last month
- A repository of my own Sigma detection rules.☆159Updated 10 months ago
- An IDE and translation engine for detection engineers and threat hunters. Be faster, write smarter, keep 100% privacy.☆155Updated 4 months ago
- The Sigma command line interface based on pySigma☆157Updated 3 months ago
- Sigma rule specification☆139Updated last month
- ☆69Updated 4 months ago
- Sigma rules to share with the community☆121Updated 5 months ago
- Threat Hunting queries for various attacks☆237Updated this week
- Sample evtx files to use for testing hayabusa detection rules☆58Updated 8 months ago
- pySigma Elasticsearch backend☆55Updated last week
- Takajō (鷹匠) is a Hayabusa results analyzer.☆127Updated last week
- Pointing cybersecurity teams to thousands of detection rules and offensive security tests aligned with common attacker techniques☆135Updated last year
- A repository to share publicly available Velociraptor detection content☆184Updated last week
- Rapidly Search and Hunt through Linux Forensics Artifacts☆195Updated last year
- This repository contains helper scripts and custom configs to get the best out of Google's Timesketch project.☆110Updated last year
- LOKI2 - Simple IOC and YARA Scanner☆95Updated 2 weeks ago
- yara detection rules for hunting with the threathunting-keywords project☆124Updated 2 months ago
- Signatures and IoCs from public Volexity blog posts.☆355Updated last month
- Awesome list of keywords and artifacts for Threat Hunting sessions☆585Updated last week
- Set of EVTX samples (>270) mapped to MITRE ATT&CK tactic and techniques to measure your SIEM coverage or developed new use cases.☆581Updated 6 months ago
- ☆196Updated last year
- Indicators of Compromise☆207Updated 3 weeks ago
- Live forensic artifacts collector☆168Updated last year
- Sigma rules from Joe Security☆217Updated 8 months ago