Sigma is Generic Signature Format for SIEM Systems written by Florian Roth @Neo23x0 and Thomas Patzke. This repository is providing spreadsheet containing conversion of Sigma rules to various SIEM vendors.
☆33Oct 16, 2019Updated 6 years ago
Alternatives and similar repositories for Sigma-to
Users that are interested in Sigma-to are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Simple script to generate commands to achieve reverse shells.☆12Aug 12, 2019Updated 6 years ago
- Resources and notes for Offensive Security's SOC-200 course and OffSec Defense Analyst (OSDA) exam☆17May 19, 2023Updated 2 years ago
- Forensics scripts aimed at automating & enhancing the Forensics Legend Eric Zimmerman's techniques, integrating the statistical detection…☆18Sep 7, 2023Updated 2 years ago
- Windows / Linux Local Privilege Escalation Workshop☆11Jan 15, 2019Updated 7 years ago
- Scanner that runs enumeration scripts while you do other things, made for the OSCP exam☆26May 1, 2020Updated 5 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- The Enhanced MITRE ATT&CK® Coverage Tracker is an Excel tool for SOCs to measure and improve detection coverage of cyber threats. It simp…☆34Nov 13, 2025Updated 4 months ago
- Knowledge base of analytics designed to cover threats based on MITRE's ATT&CK.☆23Dec 13, 2018Updated 7 years ago
- Generates a detailed CSV file containing Sigma Rules statistics for each service or category, and each level, offering a holistic view of…☆10Dec 22, 2023Updated 2 years ago
- ReverShellGenerator - A tool to generate various ways to do a reverse shell☆12Mar 2, 2019Updated 7 years ago
- Integration for Jira ticket creation from Tenable vulnerability scans☆17Mar 28, 2019Updated 7 years ago
- Searches for Insider Threat Hunting☆29May 2, 2019Updated 6 years ago
- Threat hunting repo for my independent study on threat hunting with OSQuery☆27Jan 16, 2018Updated 8 years ago
- use ue4 make war3 (AmbitionOfNobunaga)☆14Apr 16, 2016Updated 9 years ago
- an excel-centric approach for the MITRE ATT&CK® Tactics and Techniques☆187May 5, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆30Aug 22, 2019Updated 6 years ago
- This includes all the templates of nuclei collected from different sources☆18Dec 30, 2022Updated 3 years ago
- All the useful tools interesting to be used☆24Sep 20, 2022Updated 3 years ago
- ☆19Oct 23, 2020Updated 5 years ago
- JoeSandbox-Bro is a simple bro script which extracts files from your internet connection and analyzes them automatically on Joe Sandbox☆44Jun 6, 2019Updated 6 years ago
- A curated repository of incident response playbooks☆120Jul 17, 2023Updated 2 years ago
- Provides an advanced baseline to implement a secure Windows auditing strategy on Windows OS.☆65Feb 22, 2026Updated last month
- Threat Hunting & Incident Investigation with Osquery☆217Mar 30, 2022Updated 4 years ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆19Mar 26, 2019Updated 7 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- ☆11Dec 31, 2018Updated 7 years ago
- Offensive Assembly code snippets.☆13Jul 12, 2023Updated 2 years ago
- ☆22Mar 22, 2026Updated last week
- Shell Scripting with Bash, by EC-Council☆11Jun 4, 2021Updated 4 years ago
- An SSH honeypot written entirely in Go.☆13Dec 4, 2025Updated 3 months ago
- Osquery Packs we use for customer security hardening☆12Jun 30, 2025Updated 8 months ago
- Automated detection rule analysis utility☆28Sep 22, 2022Updated 3 years ago
- simple webapp for converting sigma rules into siem queries using the pySigma library☆50Sep 1, 2023Updated 2 years ago
- A tool for detecting sensitive data in code repositories☆18Feb 25, 2026Updated last month
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Over 100K open-source YARA signatures evaluated against over 280K files to give insights into the performance of each YARA rule.☆27Dec 13, 2022Updated 3 years ago
- Threat Detection & Anomaly Detection rules for popular open-source components☆53Jul 27, 2022Updated 3 years ago
- Public repository for Red Canary Research☆38Oct 29, 2020Updated 5 years ago
- 基于行为的Ransomware检测原型☆40Oct 29, 2017Updated 8 years ago
- Automated Real-Time Threat Hunting with ATD, Active Response and Elasticsearch/Kibana☆10Aug 17, 2018Updated 7 years ago
- ALPHA/WIP for OSquery configuration for Mac and Linux Operating Systems☆16Jan 9, 2018Updated 8 years ago
- Splunk App for MITRE Att&CK Navigator(TM)☆23Mar 25, 2021Updated 5 years ago