This is the One Stop place where you can several Detection Rules which can help you to kick start your journey on SIEM, SOC work.
☆42Jun 27, 2021Updated 4 years ago
Alternatives and similar repositories for Detection-Rule-Dump
Users that are interested in Detection-Rule-Dump are comparing it to the libraries listed below
Sorting:
- Getting FREE Cyber Security Resources have been a challenge always. Access Davy-Jones-Locker to get all what you might need to upskill yo…☆62Mar 22, 2021Updated 4 years ago
- 🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.☆12Jan 11, 2020Updated 6 years ago
- This is the One Stop place where you can find almost all of your Tools of Requirements in DFIR☆84Mar 3, 2022Updated 4 years ago
- Field guide to gather low-hanging fruits☆14Mar 20, 2025Updated 11 months ago
- Documentation and tools to curate Sigma rules for Windows event logs into easier to parse rules.☆16Oct 22, 2025Updated 4 months ago
- SPL for aws datasets☆14Jul 9, 2025Updated 7 months ago
- Assist analyst and threat hunters to understand Windows authentication logs and to analyze brutforce scenarios.☆20Jul 1, 2023Updated 2 years ago
- Powershell Scripts to work on Crowdstrike Falcon that pull back raw data relevant to forensic investigation☆23Dec 18, 2024Updated last year
- These are open source rules that can be utilized with QRadar to detect various types of threats in the environment.☆59Jun 11, 2019Updated 6 years ago
- macOS triage is a python script to collect various macOS logs, artifacts, and other data.☆25Mar 25, 2021Updated 4 years ago
- Unofficial third-party scripts, playbooks, and content for IBM QRadar & QRadar Community Edition.☆87May 8, 2025Updated 9 months ago
- Example scripts and rules for use in Resilient playbooks.☆35Dec 15, 2023Updated 2 years ago
- Some important DFIR Resources☆84Mar 16, 2023Updated 2 years ago
- ☆172Feb 19, 2026Updated 2 weeks ago
- Sigma Detection Rule Repository☆92Jun 18, 2020Updated 5 years ago
- ☆13Mar 12, 2025Updated 11 months ago
- BulkStrike enables the usage of CrowdStrike Real Time Response (RTR) to bulk execute commands on multiple machines.☆43Nov 27, 2022Updated 3 years ago
- ☆22Nov 22, 2025Updated 3 months ago
- MIPI to HDMI converter☆28Oct 29, 2025Updated 4 months ago
- Local LLM Testing & Benchmarking for Apple Silicon☆56Feb 26, 2026Updated last week
- Modeling and simulation of ICS devices☆13Jan 28, 2026Updated last month
- Lazy SPL to detect Spring4Shell exploitation☆12Jul 8, 2022Updated 3 years ago
- Set of SIGMA rules (>350) mapped to MITRE ATT&CK tactic and techniques☆414Nov 8, 2025Updated 3 months ago
- Cyber Incident Response Team Playbook Battle Cards☆424May 10, 2024Updated last year
- This is a collection of threat detection rules / rules engines that I have come across.☆296May 5, 2024Updated last year
- SANS has a massive list of posters available for quick reference to aid you in your security learning.☆75Oct 22, 2021Updated 4 years ago
- This is a Project Designed for Security Analysts and all SOC audiences who wants to play with implementation and explore the Modern SOC a…☆721Sep 23, 2024Updated last year
- ☆11Dec 9, 2025Updated 2 months ago
- OpenSMTPD filter implementing a Prometheus exporter☆12Aug 28, 2025Updated 6 months ago
- Tool for end-to-end testing of proxy servers☆11Dec 24, 2022Updated 3 years ago
- DuckyScript interpreter for ESP32S2/S3☆15Jan 31, 2025Updated last year
- Save as PDF addon for Firefox and Google Chrome☆15Jun 12, 2025Updated 8 months ago
- An ACME server for use with DANE on Handshake domains.☆12Mar 2, 2024Updated 2 years ago
- Scanner for Log4j RCE CVE-2021-44228☆11Jul 6, 2022Updated 3 years ago
- PowerShell scripts to aid investigators when utilizing O365 and Magnet Axiom.☆12Aug 26, 2024Updated last year
- Volatility plugin to search for all Autostart Extensibility Points (AESPs)☆10May 16, 2024Updated last year
- A curated list of CTF frameworks, libraries, resources and softwares☆10Nov 11, 2015Updated 10 years ago
- A package that get baseball data☆13Feb 24, 2025Updated last year
- Python script to run battery of Volatility plugins against a forensic memory image☆10Jun 22, 2019Updated 6 years ago