Yamato-Security / sigma-to-hayabusa-converterLinks
Documentation and tools to curate Sigma rules for Windows event logs into easier to parse rules.
☆15Updated last week
Alternatives and similar repositories for sigma-to-hayabusa-converter
Users that are interested in sigma-to-hayabusa-converter are comparing it to the libraries listed below
Sorting:
- ☆18Updated 5 months ago
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆34Updated 2 months ago
- An experimental Velociraptor implementation using cloud infrastructure☆26Updated this week
- VTC - Velociraptor Timeline Creator☆18Updated last year
- This script enhances endpoint logging telemetry for the purpose of advanced malware threat detection or for building detections or malwar…☆33Updated 5 months ago
- Quick ESXi Log Parser☆26Updated 2 weeks ago
- ESXi Cyber Security Incident Response Script☆25Updated last year
- Evtx Log (xml) Browser☆56Updated 2 years ago
- ☆11Updated 2 years ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆65Updated 3 years ago
- Living off the False Positive!☆40Updated 7 months ago
- Assist analyst and threat hunters to understand Windows authentication logs and to analyze brutforce scenarios.☆18Updated 2 years ago
- Rapid7 Labs operates as the division of Rapid7 focused on threat research. It is renowned for providing comprehensive threat intelligence…☆71Updated 3 months ago
- A repository containing the research output from my GCFE Gold Paper which compared Windows 10 and Windows 11.☆27Updated 3 years ago
- A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.☆34Updated last year
- Hunt for SQLite files used by various applications☆26Updated 3 weeks ago
- Dissect triage scripts for Citrix NetScaler devices☆58Updated 2 weeks ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆54Updated 9 months ago
- Detection rule validation☆41Updated last year
- Look into EDR events from network☆24Updated 4 months ago
- Yara Rules for Modern Malware☆79Updated last year
- Tools and scripts to deploy and manage OpenRelik instances☆15Updated 3 months ago
- ☆23Updated 11 months ago
- MS Graph Commands and Tools for Blue Teamers☆50Updated last year
- Provides an advanced baseline to implement a secure Windows auditing strategy on Windows OS.☆56Updated 3 months ago
- Placeholder for my detection repo and misc detection engineering content☆42Updated last year
- Windows Event Log Auditor☆41Updated 3 weeks ago
- ☆44Updated 2 months ago
- Hundred Days of Yara Challenge☆12Updated 3 years ago
- Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.☆31Updated 7 months ago