Sigma is Generic Signature Format for SIEM Systems written by Florian Roth @Neo23x0 and Thomas Patzke. This repository is providing spreadsheet containing conversion of Sigma rules to various SIEM vendors.
☆33Oct 16, 2019Updated 6 years ago
Alternatives and similar repositories for Sigma-to
Users that are interested in Sigma-to are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Resources and notes for Offensive Security's SOC-200 course and OffSec Defense Analyst (OSDA) exam☆17May 19, 2023Updated 2 years ago
- Scanner that runs enumeration scripts while you do other things, made for the OSCP exam☆26May 1, 2020Updated 5 years ago
- A script to create and assign SOP tasks into the cases☆20Aug 16, 2020Updated 5 years ago
- The Enhanced MITRE ATT&CK® Coverage Tracker is an Excel tool for SOCs to measure and improve detection coverage of cyber threats. It simp…☆35Nov 13, 2025Updated 5 months ago
- Knowledge base of analytics designed to cover threats based on MITRE's ATT&CK.☆23Dec 13, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Generates a detailed CSV file containing Sigma Rules statistics for each service or category, and each level, offering a holistic view of…☆10Dec 22, 2023Updated 2 years ago
- ReverShellGenerator - A tool to generate various ways to do a reverse shell☆12Mar 2, 2019Updated 7 years ago
- Discover least permissive security posture, Network Microsegmentation, and Application behaviour based on visibility/observability data e…☆34May 19, 2025Updated 11 months ago
- Integration for Jira ticket creation from Tenable vulnerability scans☆17Mar 28, 2019Updated 7 years ago
- Searches for Insider Threat Hunting☆30May 2, 2019Updated 6 years ago
- Threat hunting repo for my independent study on threat hunting with OSQuery☆27Jan 16, 2018Updated 8 years ago
- DevOps for Hackers with Hands-On Labs w/ Ralph May (4-Hour Workshop)☆18Aug 2, 2021Updated 4 years ago
- ☆30Aug 22, 2019Updated 6 years ago
- an excel-centric approach for the MITRE ATT&CK® Tactics and Techniques☆188May 5, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- This includes all the templates of nuclei collected from different sources☆18Dec 30, 2022Updated 3 years ago
- Real time graph generator of the network topology using traceroute, nmap and arborJS☆12Dec 1, 2013Updated 12 years ago
- OpenVAS plugin for GLPi☆13Mar 22, 2022Updated 4 years ago
- All the useful tools interesting to be used☆24Sep 20, 2022Updated 3 years ago
- ☆10Oct 15, 2023Updated 2 years ago
- JoeSandbox-Bro is a simple bro script which extracts files from your internet connection and analyzes them automatically on Joe Sandbox☆44Jun 6, 2019Updated 6 years ago
- Fork of OpenSearch Dashboards Security Plugin.☆14Updated this week
- Provides an advanced baseline to implement a secure Windows auditing strategy on Windows OS.☆67Feb 22, 2026Updated last month
- A curated repository of incident response playbooks☆122Jul 17, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Threat Hunting & Incident Investigation with Osquery☆217Mar 30, 2022Updated 4 years ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆19Mar 26, 2019Updated 7 years ago
- ☆11Dec 31, 2018Updated 7 years ago
- Offensive Assembly code snippets.☆13Jul 12, 2023Updated 2 years ago
- ☆23Mar 25, 2026Updated 3 weeks ago
- Shell Scripting with Bash, by EC-Council☆11Jun 4, 2021Updated 4 years ago
- An SSH honeypot written entirely in Go.☆14Dec 4, 2025Updated 4 months ago
- Modeling and simulation of ICS devices☆13Mar 6, 2026Updated last month
- CLI enabling more autonomous black-box penetration tests using Large Language Models (LLMs)☆47Updated this week
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Osquery Packs we use for customer security hardening☆12Jun 30, 2025Updated 9 months ago
- Automated detection rule analysis utility☆29Sep 22, 2022Updated 3 years ago
- A tool for detecting sensitive data in code repositories☆18Mar 26, 2026Updated 3 weeks ago
- Threat Detection & Anomaly Detection rules for popular open-source components☆53Jul 27, 2022Updated 3 years ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 8 years ago
- Public repository for Red Canary Research☆38Oct 29, 2020Updated 5 years ago
- Ludus range for the Constructing Defense Lab☆118Apr 5, 2026Updated 2 weeks ago