A collection of Sigma rules organized by MITRE ATT&CK technique
☆18Apr 1, 2026Updated last month
Alternatives and similar repositories for sigma-rules
Users that are interested in sigma-rules are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆20Oct 23, 2020Updated 5 years ago
- Sigma Detection Rule Repository☆93Jun 18, 2020Updated 5 years ago
- Sigma rules from Joe Security☆237Nov 4, 2024Updated last year
- ☆11Feb 9, 2023Updated 3 years ago
- OpenCSPM Community Controls☆14May 18, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- 🌌 Real-time threat detection for smart contracts☆10May 16, 2023Updated 2 years ago
- SIEM Detection Use Case Library mapped to MITRE ATT&CK tactics and techniques☆12Oct 28, 2018Updated 7 years ago
- SharpReg is a simple code set to interact with the Remote Registry service api and is compatible with Cobalt Strike.☆27Apr 12, 2020Updated 6 years ago
- ☆36Nov 26, 2024Updated last year
- This directory contains random scripts from threat hunting or malware research☆11Feb 15, 2018Updated 8 years ago
- ☆33Apr 7, 2020Updated 6 years ago
- Rules generated from our investigations.☆208Jun 17, 2025Updated 10 months ago
- ETHICAL-HACKING☆13Dec 20, 2023Updated 2 years ago
- Scripts and tools accompanying HP Threat Research blog posts and reports.☆50Apr 10, 2024Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Certipy in Docker☆13Mar 28, 2024Updated 2 years ago
- Legacy password hashing framework for PHP applications needing to support or having previously supported PHP below 5.5☆15Nov 22, 2024Updated last year
- Set of SIGMA rules (>350) mapped to MITRE ATT&CK tactic and techniques☆426Nov 8, 2025Updated 5 months ago
- Command line tool for analyzing .json files generated by bloodhound.py or sharphound for use in Bloodhound.☆20Jan 12, 2019Updated 7 years ago
- Curated Windows event log Sigma rules used in Hayabusa and Velociraptor.☆217Updated this week
- Perform file-based malware scan on your on-prem servers with AWS☆14Oct 31, 2023Updated 2 years ago
- ☆13Mar 15, 2022Updated 4 years ago
- A triage data collection script for macOS☆30Nov 27, 2020Updated 5 years ago
- Queries for Carbon Black Response☆11Feb 11, 2020Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆21May 8, 2022Updated 3 years ago
- A simple linter for Sigma rules☆13Oct 22, 2020Updated 5 years ago
- ☆19Jun 16, 2021Updated 4 years ago
- AMSI Bypass for powershell☆30Apr 26, 2022Updated 4 years ago
- Test Suite for John the Ripper☆26Dec 28, 2025Updated 4 months ago
- Quick script to build host or investigation timelines using Carbon Black Response☆12Sep 25, 2018Updated 7 years ago
- Small container runtime for threat detection☆14Apr 13, 2025Updated last year
- Script to retrieve the list of AWS Services and their one-line descriptions☆37Dec 25, 2020Updated 5 years ago
- Cloud threat detection visualization from excalidraw☆12Apr 25, 2022Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ONYX: Cisco Automated Assessment and Auditing Tool (CAAAT). An open-source tool that automatically assesses and audits Cisco IOS routers …☆21May 6, 2025Updated 11 months ago
- Implementation of bcrypt password hashing scheme☆12Jan 11, 2021Updated 5 years ago
- Federated Office365 user enumeration based on correlated response trend analysis☆49May 3, 2022Updated 3 years ago
- custom bloodhound queries and knowledge base☆12Apr 16, 2024Updated 2 years ago
- Detection rules and threat hunting queries in Defender XDR and Azure Sentinel☆17Mar 13, 2026Updated last month
- Hundred Days of Yara Challenge☆12Jun 21, 2022Updated 3 years ago
- Threat Detection Rules (Snort/Sigma/Yara)☆14Jan 23, 2024Updated 2 years ago