Yamato-Security / sigma-to-hayabusa-converterLinks
Documentation and tools to curate Sigma rules for Windows event logs into easier to parse rules.
☆15Updated last month
Alternatives and similar repositories for sigma-to-hayabusa-converter
Users that are interested in sigma-to-hayabusa-converter are comparing it to the libraries listed below
Sorting:
- ☆19Updated 6 months ago
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆34Updated 3 months ago
- An experimental Velociraptor implementation using cloud infrastructure☆26Updated this week
- ESXi Cyber Security Incident Response Script☆25Updated last year
- Living off the False Positive!☆40Updated 8 months ago
- Rapid7 Labs operates as the division of Rapid7 focused on threat research. It is renowned for providing comprehensive threat intelligence…☆72Updated 4 months ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆54Updated 10 months ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆65Updated 3 years ago
- This script enhances endpoint logging telemetry for the purpose of advanced malware threat detection or for building detections or malwar…☆33Updated 6 months ago
- A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.☆34Updated last year
- Evtx Log (xml) Browser☆55Updated 2 years ago
- PowerShell 'Hero': scripts for DFIR and automation with a PowerShell menu example.☆36Updated 2 years ago
- ☆11Updated 2 years ago
- VTC - Velociraptor Timeline Creator☆18Updated last year
- Placeholder for my detection repo and misc detection engineering content☆42Updated last year
- A repository containing the research output from my GCFE Gold Paper which compared Windows 10 and Windows 11.☆27Updated 3 years ago
- PowerShell Script Analyzer☆70Updated last year
- MS Graph Commands and Tools for Blue Teamers☆50Updated last year
- Yara Rules for Modern Malware☆79Updated last year
- Quick ESXi Log Parser☆26Updated last month
- Assist analyst and threat hunters to understand Windows authentication logs and to analyze brutforce scenarios.☆18Updated 2 years ago
- Detection rule validation☆41Updated last year
- Hundred Days of Yara Challenge☆12Updated 3 years ago
- Tools and scripts to deploy and manage OpenRelik instances☆15Updated 4 months ago
- Contains compiled binaries of Volatility☆37Updated 5 months ago
- ☆21Updated 7 months ago
- Provides an advanced baseline to implement a secure Windows auditing strategy on Windows OS.☆56Updated 4 months ago
- A simple script to read the contents of a zip/tar/folder and extract metadata☆20Updated last week
- Windows Event Log Auditor☆44Updated last week
- Hunt for SQLite files used by various applications☆26Updated last week