This is the One Stop place where you can several Detection Rules which can help you to kick start your journey on SIEM, SOC work.
☆43Jun 27, 2021Updated 4 years ago
Alternatives and similar repositories for Detection-Rule-Dump
Users that are interested in Detection-Rule-Dump are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Getting FREE Cyber Security Resources have been a challenge always. Access Davy-Jones-Locker to get all what you might need to upskill yo…☆62Mar 22, 2021Updated 5 years ago
- 🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.☆12Jan 11, 2020Updated 6 years ago
- Documentation and tools to curate Sigma rules for Windows event logs into easier to parse rules.☆16Oct 22, 2025Updated 5 months ago
- Field guide to gather low-hanging fruits☆14Mar 20, 2025Updated last year
- This is the One Stop place where you can find almost all of your Tools of Requirements in DFIR☆84Mar 3, 2022Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Assist analyst and threat hunters to understand Windows authentication logs and to analyze brutforce scenarios.☆21Jul 1, 2023Updated 2 years ago
- These are open source rules that can be utilized with QRadar to detect various types of threats in the environment.☆59Jun 11, 2019Updated 6 years ago
- Powershell Scripts to work on Crowdstrike Falcon that pull back raw data relevant to forensic investigation☆23Dec 18, 2024Updated last year
- Synopsis is a tool to aid analysts reviewing browser history files by providing a high-level “synopsis” of key information.☆23Oct 31, 2018Updated 7 years ago
- g(ULP) core backend and plugins☆58Updated this week
- A curated list of CTF frameworks, libraries, resources and softwares☆10Nov 11, 2015Updated 10 years ago
- Cyber Incident Response Team Playbook Battle Cards☆425May 10, 2024Updated last year
- Exactly what it sounds like, which is something rad☆22Oct 12, 2022Updated 3 years ago
- Crowdstrike Falcon Host script for iterating through instances to get alert and other relevant data☆13Jul 16, 2019Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A web scraper to create MISP events and reports☆17Jun 30, 2025Updated 8 months ago
- macOS triage is a python script to collect various macOS logs, artifacts, and other data.☆25Mar 25, 2021Updated 5 years ago
- Kali Linux Cheat Sheet for Penetration Testers☆14Jun 19, 2017Updated 8 years ago
- Python Remote Administration Tool☆15Jan 8, 2017Updated 9 years ago
- This is a Project Designed for Security Analysts and all SOC audiences who wants to play with implementation and explore the Modern SOC a…☆723Sep 23, 2024Updated last year
- Quick SOC L1 ticket structure☆40Jun 20, 2019Updated 6 years ago
- Set of SIGMA rules (>350) mapped to MITRE ATT&CK tactic and techniques☆417Nov 8, 2025Updated 4 months ago
- SPL for aws datasets☆14Jul 9, 2025Updated 8 months ago
- Ansible playbook to convert Sigma rules to ElastAlert rules☆10Feb 5, 2021Updated 5 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆29Aug 12, 2021Updated 4 years ago
- Example scripts and rules for use in Resilient playbooks.☆35Dec 15, 2023Updated 2 years ago
- ☆173Mar 16, 2026Updated last week
- ☆14May 6, 2016Updated 9 years ago
- Incident Response Report Using GitHub-Sphinx☆20Oct 28, 2019Updated 6 years ago
- This is a collection of threat detection rules / rules engines that I have come across.☆297May 5, 2024Updated last year
- Twitter Search to Cisco Threat Response Casebook [v1.0]☆15Dec 8, 2022Updated 3 years ago
- Virtual Lab builder and player☆15Aug 25, 2021Updated 4 years ago
- A PowerShell incident response script for quick triage☆81Jul 18, 2022Updated 3 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- a burp extension for dynamic payload generation to detect injection flaws (RCE, LFI, SQLi), creates access matrix based user sessions to …☆15Apr 25, 2022Updated 3 years ago
- ☆16Aug 29, 2025Updated 6 months ago
- Credit goes to Imran-Parray☆14Feb 15, 2022Updated 4 years ago
- Python Library for the IBM SOAR REST API, a Python SDK for developing Apps for IBM SOAR and more...☆42Nov 13, 2025Updated 4 months ago
- A few quick recipes for those that do not have much time during the day☆22Oct 28, 2024Updated last year
- An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations.☆340Dec 3, 2025Updated 3 months ago
- A free data collection and YARA scanning tool for cybersecurity incident investigation, compromise assessment and threat hunting☆21Nov 12, 2024Updated last year