Collection of example YARA-L rules for use within Google Security Operations
☆484Dec 5, 2025Updated 4 months ago
Alternatives and similar repositories for detection-rules
Users that are interested in detection-rules are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Python samples and utilities for Chronicle APIs☆88Nov 7, 2025Updated 5 months ago
- Collection of detection rules written in YARA-L.☆30Oct 4, 2025Updated 6 months ago
- Command line tool to interact with Chronicle's Config Based Normalizer (CBN) APIs.☆32Aug 31, 2023Updated 2 years ago
- ☆39Mar 26, 2026Updated 2 weeks ago
- Built-in Panther detection rules and policies☆442Apr 2, 2026Updated last week
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Community Security Analytics provides a set of community-driven audit & threat queries for Google Cloud☆365Jun 12, 2024Updated last year
- A CLI tool for managing Chronicle user workflows☆18Sep 24, 2025Updated 6 months ago
- ☆2,546Updated this week
- A POC to implement Detection-as-Code with Terraform and Sumo Logic.☆31Jul 27, 2023Updated 2 years ago
- ☆65May 21, 2024Updated last year
- Detection Engineering is a tactical function of a cybersecurity defense program that involves the design, implementation, and operation o…☆1,162Apr 1, 2026Updated last week
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆60Mar 12, 2022Updated 4 years ago
- Take automated actions against threats and vulnerabilities.☆216Sep 14, 2023Updated 2 years ago
- This is a collection of threat detection rules / rules engines that I have come across.☆298May 5, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Main Sigma Rule Repository☆10,279Apr 1, 2026Updated last week
- A framework for developing alerting and detection strategies for incident response.☆857Sep 8, 2025Updated 7 months ago
- Splunk Security Content☆1,599Apr 2, 2026Updated last week
- ☆552Dec 4, 2023Updated 2 years ago
- Threat Detection & Anomaly Detection rules for popular open-source components☆53Jul 27, 2022Updated 3 years ago
- Set of SIGMA rules (>350) mapped to MITRE ATT&CK tactic and techniques☆422Nov 8, 2025Updated 5 months ago
- Hunting queries and detections☆893Oct 30, 2025Updated 5 months ago
- Content related to medium.com/@thatsiemguy☆19Nov 16, 2025Updated 4 months ago
- KQL Queries. Defender For Endpoint and Azure Sentinel Hunting and Detection Queries in KQL. Out of the box KQL queries for: Advanced Hunt…☆1,679Apr 3, 2026Updated last week
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Re-play Security Events☆1,732Mar 20, 2024Updated 2 years ago
- Python library to parse and convert Sigma rules into queries (and whatever else you could imagine)☆538Apr 3, 2026Updated last week
- 🐻❄️ 🏹 Threat hunting with Polars and flaws.cloud AWS CloudTrail datasets.☆14May 22, 2024Updated last year
- YARA signature and IOC database for my scanners and tools☆2,910Updated this week
- A repository of my own Sigma detection rules.☆164Nov 25, 2025Updated 4 months ago
- Elastic Security detection content for Endpoint☆1,394Apr 3, 2026Updated last week
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆341Updated this week
- ☆40Nov 29, 2024Updated last year
- An informational repo about hunting for adversaries in your IT environment.☆1,858Nov 17, 2021Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Repository for threat hunting and detection queries, etc. for Defender for Endpoint and Microsoft Sentinel in KQL(Kusto Query Language).☆808Jan 14, 2026Updated 2 months ago
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,526Jan 12, 2026Updated 2 months ago
- Detection Ideas & Rules repository.☆178Sep 10, 2021Updated 4 years ago
- A standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logs☆801Updated this week
- ✨ A curated list of awesome threat detection and hunting resources 🕵️♂️☆4,549Jan 5, 2026Updated 3 months ago
- Rules generated from our investigations.☆207Jun 17, 2025Updated 9 months ago
- A knowledge base of actionable Incident Response techniques☆665May 31, 2022Updated 3 years ago