Yamato-Security / suzaku-rulesLinks
☆10Updated this week
Alternatives and similar repositories for suzaku-rules
Users that are interested in suzaku-rules are comparing it to the libraries listed below
Sorting:
- pocket guide for core detection engineering concepts☆30Updated 2 years ago
- Sigma detection rules for hunting with the threathunting-keywords project☆56Updated 5 months ago
- ☆17Updated last month
- Suzaku (朱雀) is a sigma-based threat hunting and fast forensics timeline generator for cloud logs.☆139Updated last week
- A preconfigured Windows-based system designed for rapid forensic investigations in both Azure and AWS.☆39Updated last year
- This repository contains the research and components of our research into using Sigma for AWS Incident Response.☆29Updated 2 years ago
- Rules shared by the community from 100 Days of YARA 2025☆34Updated 6 months ago
- The Event Maturity Matrix (EMM) is a comprehensive framework that provides clarity regarding the capabilities and nuances of SaaS audit l…☆22Updated last month
- The Eventlog Compendium is the go-to resource for understanding Windows Event Logs.☆48Updated 3 months ago
- Repository that contains a set of purposefully erroneous Yara rules.☆58Updated 2 weeks ago
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆51Updated 9 months ago
- A pySigma wrapper and langchain toolkit for automatic rule creation/translation☆84Updated 2 months ago
- ☆94Updated this week
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆47Updated 3 months ago
- Convert Sigma rules to SIEM queries, directly in your browser.☆92Updated last week
- Tools and scripts to deploy and manage OpenRelik instances☆14Updated 2 months ago
- A preconfigured Velociraptor triage collector☆52Updated last week
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆101Updated 9 months ago
- Track progress and keep notes while working through likethecoins' CTI Self Study Plan☆28Updated 2 years ago
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆77Updated last month
- Sample evtx files to use for testing hayabusa detection rules☆59Updated 9 months ago
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆30Updated 3 weeks ago
- Intel Retrieval Augmented Generation (RAG) Utilities☆90Updated last year
- ☆21Updated 11 months ago
- The core backend server handling API requests and task management☆43Updated last week
- ☆24Updated 6 months ago
- Collects a listing of MITRE ATT&CK Techniques, then discovers Splunk ESCU detections for each technique☆67Updated last year
- This repository is created to store the artifacts for any intrusions I share publicly.☆26Updated 2 years ago
- Finding ClickFix and FakeCAPTCHA like it's 1999☆45Updated this week
- An index of publicly available and open-source threat detection rulesets.☆120Updated 3 months ago