Collection of example YARA-L rules for use within Google Security Operations
☆477Dec 5, 2025Updated 3 months ago
Alternatives and similar repositories for detection-rules
Users that are interested in detection-rules are comparing it to the libraries listed below
Sorting:
- Python samples and utilities for Chronicle APIs☆88Nov 7, 2025Updated 4 months ago
- Collection of detection rules written in YARA-L.☆28Oct 4, 2025Updated 5 months ago
- Command line tool to interact with Chronicle's Config Based Normalizer (CBN) APIs.☆32Aug 31, 2023Updated 2 years ago
- ☆39Mar 2, 2026Updated 2 weeks ago
- Built-in Panther detection rules and policies☆441Mar 13, 2026Updated last week
- Community Security Analytics provides a set of community-driven audit & threat queries for Google Cloud☆366Jun 12, 2024Updated last year
- A CLI tool for managing Chronicle user workflows☆18Sep 24, 2025Updated 5 months ago
- ☆2,525Updated this week
- A POC to implement Detection-as-Code with Terraform and Sumo Logic.☆31Jul 27, 2023Updated 2 years ago
- ☆65May 21, 2024Updated last year
- Detection Engineering is a tactical function of a cybersecurity defense program that involves the design, implementation, and operation o…☆1,151Dec 19, 2025Updated 3 months ago
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆60Mar 12, 2022Updated 4 years ago
- Take automated actions against threats and vulnerabilities.☆216Sep 14, 2023Updated 2 years ago
- This is a collection of threat detection rules / rules engines that I have come across.☆297May 5, 2024Updated last year
- Public Chronicle Detection Rules☆12Apr 25, 2023Updated 2 years ago
- Main Sigma Rule Repository☆10,203Updated this week
- A framework for developing alerting and detection strategies for incident response.☆852Sep 8, 2025Updated 6 months ago
- Splunk Security Content☆1,584Mar 14, 2026Updated last week
- ☆553Dec 4, 2023Updated 2 years ago
- Content related to medium.com/@thatsiemguy☆19Nov 16, 2025Updated 4 months ago
- Threat Detection & Anomaly Detection rules for popular open-source components☆53Jul 27, 2022Updated 3 years ago
- Set of SIGMA rules (>350) mapped to MITRE ATT&CK tactic and techniques☆416Nov 8, 2025Updated 4 months ago
- Hunting queries and detections☆887Oct 30, 2025Updated 4 months ago
- KQL Queries. Defender For Endpoint and Azure Sentinel Hunting and Detection Queries in KQL. Out of the box KQL queries for: Advanced Hunt…☆1,661Mar 9, 2026Updated last week
- Re-play Security Events☆1,728Mar 20, 2024Updated 2 years ago
- Python library to parse and convert Sigma rules into queries (and whatever else you could imagine)☆535Updated this week
- 🐻❄️ 🏹 Threat hunting with Polars and flaws.cloud AWS CloudTrail datasets.☆14May 22, 2024Updated last year
- YARA signature and IOC database for my scanners and tools☆2,884Mar 9, 2026Updated last week
- A repository of my own Sigma detection rules.☆163Nov 25, 2025Updated 3 months ago
- Elastic Security detection content for Endpoint☆1,384Mar 13, 2026Updated last week
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆339Updated this week
- ☆40Nov 29, 2024Updated last year
- An informational repo about hunting for adversaries in your IT environment.☆1,859Nov 17, 2021Updated 4 years ago
- Repository for threat hunting and detection queries, etc. for Defender for Endpoint and Microsoft Sentinel in KQL(Kusto Query Language).☆804Jan 14, 2026Updated 2 months ago
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,501Jan 12, 2026Updated 2 months ago
- Detection Ideas & Rules repository.☆178Sep 10, 2021Updated 4 years ago
- A standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logs☆791Updated this week
- ✨ A curated list of awesome threat detection and hunting resources 🕵️♂️☆4,532Jan 5, 2026Updated 2 months ago
- A knowledge base of actionable Incident Response techniques☆662May 31, 2022Updated 3 years ago