☆20May 5, 2024Updated last year
Alternatives and similar repositories for SigGen
Users that are interested in SigGen are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Manage and maintain Defender XDR custom collection configuration☆35Nov 19, 2025Updated 5 months ago
- Ingest Nessus files into Elasticsearch using PowerShell!☆19Mar 22, 2026Updated last month
- A list of JARM fingerprints from malicious IPs, matched against known C2 fingerprints.☆12Jun 9, 2025Updated 10 months ago
- JXA implementation of some SwiftBelt functions. Author: Cedric Owens☆46Jun 22, 2023Updated 2 years ago
- Configure and deploy AWS GuardDuty.☆12Sep 9, 2025Updated 7 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A small crappy script I wrote that converts the Sigma Windows Process Creation events to KQL via PySigma. Designed for CI/CD☆10Nov 7, 2023Updated 2 years ago
- The object detection solution accelerator provides a pre-packaged solution to train, deploy and monitor custom object detection models us…☆14Jan 24, 2024Updated 2 years ago
- ☆13May 9, 2022Updated 3 years ago
- A Catalog of Application Whitelisting Bypass Techniques☆11Jul 14, 2017Updated 8 years ago
- Easily scan with multiple yara rules from different sources.☆14Mar 9, 2024Updated 2 years ago
- Mapping of open-source detection rules and atomic tests.☆209Feb 16, 2026Updated 2 months ago
- Explore ThalesGroup's comprehensive framework for secure machine learning systems on this repository. Developed by Thales experts, this f…☆24Apr 14, 2026Updated 3 weeks ago
- A guide to simplify the process of evaluating Datadog's Cloud SIEM security capabilities to detect AWS threats.☆20Jul 24, 2023Updated 2 years ago
- Some proxy utilities I've made. PacDbg to debug and troubelshoot a PacFile, and CustomProxy to browse the internet with a custom proxy se…☆24Sep 12, 2017Updated 8 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Lightweight C# windows agent for Apfell☆17Mar 16, 2020Updated 6 years ago
- Python Library for ConfigExtractor☆16Feb 24, 2026Updated 2 months ago
- A dataset of phishing kits in the wild☆15Jun 1, 2024Updated last year
- CTFs On Demand☆13Mar 23, 2025Updated last year
- OASIS TC Open Repository: Match STIX content against STIX patterns☆46Aug 1, 2022Updated 3 years ago
- This repository contains the research and components of our research into using Sigma for AWS Incident Response.☆31Jul 12, 2023Updated 2 years ago
- Repository of tools, YARA rules, and code-snippets from Stairwell's research team.☆23Jan 31, 2024Updated 2 years ago
- A web API for various cyber threat intelligence frameworks, including MITRE ATT&CK, CWE, ATLAS...☆20Updated this week
- ☆17Updated this week
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Detection Engineering research, open-source tools, conference presentations, and technical publications shared with the security communit…☆28Dec 17, 2025Updated 4 months ago
- pySigma Elasticsearch backend☆65Apr 23, 2026Updated last week
- MCP server for Kibana, Access search and manage Kibana in MCP Client.☆62Apr 6, 2026Updated 3 weeks ago
- The growing network connectivity witnessed in Supervisory Control and Data Acquisition (SCADA) systems raises cyber security concerns for…☆19Jan 19, 2018Updated 8 years ago
- Mythic Developer Series: Workshop Golang Agent☆25Jun 27, 2023Updated 2 years ago
- ☆15Jun 9, 2018Updated 7 years ago
- MCP Server that integrates with Security Copilot, Sentinel and other tools (in the future). It enhance the process of developing , testin…☆23Oct 8, 2025Updated 6 months ago
- Python tool to analyze PE file for patterns used by malware☆28Nov 12, 2022Updated 3 years ago
- A dataset with CloudTrail events from an attack simulation using Stratus.☆25Jul 12, 2023Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- 基于半监督深度学习的木马流量检测方法☆29Jun 11, 2023Updated 2 years ago
- ✨ Open-source AI hackers for your apps 👨🏻💻☆34Sep 9, 2025Updated 7 months ago
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆63Apr 11, 2026Updated 3 weeks ago
- A POC to implement Detection-as-Code with Terraform and Sumo Logic.☆31Jul 27, 2023Updated 2 years ago
- Useful Powershell Tools for operating or testing Infocyte HUNT☆19Jan 10, 2025Updated last year
- An opensource sigma conversion tool built using pysigma☆164Apr 22, 2026Updated last week
- [BMVC2024] Erasing Concepts from Text-to-Image Diffusion Models with Few-shot Unlearning☆14Updated this week