Collection of example YARA-L rules for use within Google Security Operations
☆491May 18, 2026Updated this week
Alternatives and similar repositories for detection-rules
Users that are interested in detection-rules are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Python samples and utilities for Chronicle APIs☆91Apr 10, 2026Updated last month
- Collection of detection rules written in YARA-L.☆30Oct 4, 2025Updated 7 months ago
- Command line tool to interact with Chronicle's Config Based Normalizer (CBN) APIs.☆32Aug 31, 2023Updated 2 years ago
- ☆43Apr 14, 2026Updated last month
- Built-in Panther detection rules and policies☆452Updated this week
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Community Security Analytics provides a set of community-driven audit & threat queries for Google Cloud☆366Jun 12, 2024Updated last year
- A CLI tool for managing Chronicle user workflows☆18Apr 13, 2026Updated last month
- ☆2,574May 13, 2026Updated last week
- A POC to implement Detection-as-Code with Terraform and Sumo Logic.☆32Jul 27, 2023Updated 2 years ago
- ☆66May 21, 2024Updated 2 years ago
- Detection Engineering is a tactical function of a cybersecurity defense program that involves the design, implementation, and operation o…☆1,195Apr 30, 2026Updated 3 weeks ago
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆61Mar 12, 2022Updated 4 years ago
- Take automated actions against threats and vulnerabilities.☆215Sep 14, 2023Updated 2 years ago
- This is a collection of threat detection rules / rules engines that I have come across.☆298May 5, 2024Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Public Chronicle Detection Rules☆12Apr 25, 2023Updated 3 years ago
- Main Sigma Rule Repository☆10,451Updated this week
- A framework for developing alerting and detection strategies for incident response.☆875Sep 8, 2025Updated 8 months ago
- Splunk Security Content☆1,623May 14, 2026Updated last week
- Set of SIGMA rules (>350) mapped to MITRE ATT&CK tactic and techniques☆431May 9, 2026Updated last week
- ☆553Dec 4, 2023Updated 2 years ago
- Threat Detection & Anomaly Detection rules for popular open-source components☆53Jul 27, 2022Updated 3 years ago
- Hunting queries and detections☆907May 7, 2026Updated 2 weeks ago
- Python library to parse and convert Sigma rules into queries (and whatever else you could imagine)☆551May 10, 2026Updated last week
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Content related to medium.com/@thatsiemguy☆20Nov 16, 2025Updated 6 months ago
- KQL Queries. Defender For Endpoint and Azure Sentinel Hunting and Detection Queries in KQL. Out of the box KQL queries for: Advanced Hunt…☆1,694May 10, 2026Updated last week
- Re-play Security Events☆1,753Mar 20, 2024Updated 2 years ago
- 🐻❄️ 🏹 Threat hunting with Polars and flaws.cloud AWS CloudTrail datasets.☆14May 22, 2024Updated last year
- Rules generated from our investigations.☆208Jun 17, 2025Updated 11 months ago
- A repository of my own Sigma detection rules.☆165Nov 25, 2025Updated 5 months ago
- YARA signature and IOC database for my scanners and tools☆2,955May 8, 2026Updated last week
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆338May 7, 2026Updated last week
- Elastic Security detection content for Endpoint☆1,429May 11, 2026Updated last week
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆41Nov 29, 2024Updated last year
- Repository for threat hunting and detection queries, etc. for Defender for Endpoint and Microsoft Sentinel in KQL(Kusto Query Language).☆814Jan 14, 2026Updated 4 months ago
- An informational repo about hunting for adversaries in your IT environment.☆1,867Nov 17, 2021Updated 4 years ago
- Detection Ideas & Rules repository.☆178Sep 10, 2021Updated 4 years ago
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,559Jan 12, 2026Updated 4 months ago
- A community-driven repository for threat hunting ideas, methodologies, and research that serves as a central gathering place for hunters …☆315May 13, 2026Updated last week
- A standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logs☆812Updated this week