bradleyjkemp / sigma-testLinks
A test case runner for Sigma rules
☆13Updated 9 months ago
Alternatives and similar repositories for sigma-test
Users that are interested in sigma-test are comparing it to the libraries listed below
Sorting:
- A preconfigured Velociraptor triage collector☆52Updated this week
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆41Updated 3 weeks ago
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆78Updated 3 weeks ago
- Convert Sigma rules to SIEM queries, directly in your browser.☆81Updated this week
- Intel Retrieval Augmented Generation (RAG) Utilities☆90Updated last year
- Small-scale threat emulation and detection range built on Elastic and Atomic Redteam.☆38Updated last year
- VelociraptorMCP is a Model Context Protocol bridge for exposing LLMs to MCP clients.☆28Updated last week
- Threat Simulation Indexes☆38Updated last month
- Azure function to insert MISP data in to Azure Sentinel☆32Updated 2 years ago
- A pySigma wrapper and langchain toolkit for automatic rule creation/translation☆81Updated 2 weeks ago
- TIM is a Kusto investigation platform that enables a user to quickly pivot between data sources; annotate their findings; and promotes co…☆22Updated 9 months ago
- Remote access and Antivirus Logging Database☆42Updated last year
- SigmaHQ pySigma CrowdStrike processing pipeline☆26Updated 7 months ago
- This repository contains sample log data that were collected after running adversary simulations in Microsoft 365☆20Updated 7 months ago
- ☆7Updated 7 months ago
- ☆34Updated 7 months ago
- ☆19Updated 3 years ago
- Collection of scripts provided for public use☆34Updated last month
- Library of threat hunts to get any user started!☆44Updated 4 years ago
- Security Content for the PEAK Threat Hunting Framework☆29Updated last year
- Awesome Splunk SPL hunt queries that can be used to detect the latest vulnerability exploitation attempts & subsequent compromise☆63Updated last year
- ☆92Updated 3 weeks ago
- ShellSweeping the evil.☆52Updated 11 months ago
- Sigma detection rules for hunting with the threathunting-keywords project☆55Updated 3 months ago
- A pySigma wrapper to manage detection rules.☆39Updated last week
- An opinionated formatter/linter for Sigma rules☆10Updated 2 years ago
- Validates Sigma rules using the JSON schema☆16Updated last year
- Helping Incident Responders hunt for potential persistence mechanisms on UNIX-based systems.☆15Updated last year
- USN Journal full path builder☆60Updated 8 months ago
- Memory Baseliner is a script that can compare two windows memory images or perform frequency of occurrence / data stacking analysis on mu…☆54Updated last year