Yamato-Security / sigma-to-hayabusa-converterLinks
Documentation and tools to curate Sigma rules for Windows event logs into easier to parse rules.
☆13Updated 2 weeks ago
Alternatives and similar repositories for sigma-to-hayabusa-converter
Users that are interested in sigma-to-hayabusa-converter are comparing it to the libraries listed below
Sorting:
- ☆18Updated 4 months ago
- An experimental Velociraptor implementation using cloud infrastructure☆25Updated 2 weeks ago
- ☆11Updated 2 years ago
- ESXi Cyber Security Incident Response Script☆25Updated 11 months ago
- Tools and scripts to deploy and manage OpenRelik instances☆15Updated 2 months ago
- Quick ESXi Log Parser☆24Updated this week
- Hunt for SQLite files used by various applications☆26Updated 3 weeks ago
- This script enhances endpoint logging telemetry for the purpose of advanced malware threat detection or for building detections or malwar…☆33Updated 4 months ago
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆33Updated 2 months ago
- VTC - Velociraptor Timeline Creator☆18Updated last year
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆54Updated 8 months ago
- Detection rule validation☆41Updated last year
- ☆19Updated 3 years ago
- A simple script to read the contents of a zip/tar/folder and extract metadata☆22Updated 4 months ago
- A project that aims to automate Volatility3 at scale with the use of cloud strength and the power of KQL inside ADX.☆16Updated 2 weeks ago
- PowerShell 'Hero': scripts for DFIR and automation with a PowerShell menu example.☆36Updated 2 years ago
- A repository containing the research output from my GCFE Gold Paper which compared Windows 10 and Windows 11.☆27Updated 3 years ago
- ☆23Updated 10 months ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆65Updated 3 years ago
- Yara Rules for Modern Malware☆79Updated last year
- Malformed Access Log to CSV - Convert Web Server Access Logs to CSV☆17Updated 11 months ago
- ☆19Updated 2 months ago
- Assist analyst and threat hunters to understand Windows authentication logs and to analyze brutforce scenarios.☆18Updated 2 years ago
- Evtx Log (xml) Browser☆56Updated 2 years ago
- Rapid7 Labs operates as the division of Rapid7 focused on threat research. It is renowned for providing comprehensive threat intelligence…☆71Updated 2 months ago
- Linux #rootkit and #malware revealer☆26Updated last year
- The Eventlog Compendium is the go-to resource for understanding Windows Event Logs.☆48Updated 4 months ago
- The core backend server handling API requests and task management☆45Updated last week
- ☆21Updated 5 months ago
- THOR Thunderstorm Collectors☆25Updated this week