davidljohnson / SigGenLinks
☆16Updated last year
Alternatives and similar repositories for SigGen
Users that are interested in SigGen are comparing it to the libraries listed below
Sorting:
- ☆41Updated 2 weeks ago
- ☆105Updated last year
- ForgeArmory provides TTPs that can be used with the TTPForge (https://github.com/facebookincubator/ttpforge).☆113Updated 9 months ago
- Synthetic Adversarial Log Objects: A Framework for synthentic log generation☆82Updated last year
- Intel Retrieval Augmented Generation (RAG) Utilities☆90Updated last year
- Anvilogic Forge☆104Updated last week
- Collects a listing of MITRE ATT&CK Techniques, then discovers Splunk ESCU detections for each technique☆67Updated last year
- A pySigma wrapper and langchain toolkit for automatic rule creation/translation☆82Updated last month
- ☆44Updated 4 months ago
- The Event Maturity Matrix (EMM) is a comprehensive framework that provides clarity regarding the capabilities and nuances of SaaS audit l…☆21Updated 3 weeks ago
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆46Updated 2 months ago
- This CALDERA Plugin converts Adversary Emulation Plans from the Center for Threat Informed Defense☆31Updated 4 months ago
- An opensource sigma conversion tool built using pysigma☆131Updated last month
- pySigma Cookiecutter backend template☆24Updated 4 months ago
- Adversarial Interception Mission Oriented Discovery and Disruption Framework, or AIMOD2, is a structured threat hunting approach to proac…☆89Updated last year
- ALFA stands for Automated Audit Log Forensic Analysis for Google Workspace. You can use this tool to acquire all Google Workspace audit l…☆164Updated 4 months ago
- A POC to implement Detection-as-Code with Terraform and Sumo Logic.☆29Updated last year
- ☆92Updated 2 months ago
- Convert Sigma rules to SIEM queries, directly in your browser.☆91Updated this week
- pocket guide for core detection engineering concepts☆29Updated 2 years ago
- Extracts IoCs, TTPs and the relationships between them. Outputs a STIX 2.1 bundle.☆61Updated this week
- A cheatsheet containing AWS CloudTrail events that can be used for Incident Response purposes or Detection Engineering.☆75Updated last year
- A pySigma wrapper to manage detection rules.☆40Updated last week
- This repository hosts community contributed Kestrel huntflows (.hf) and huntbooks (.ipynb)☆33Updated last year
- Small-scale threat emulation and detection range built on Elastic and Atomic Redteam.☆38Updated last year
- ☆95Updated 2 years ago
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆68Updated 2 months ago
- GenAI-STIX2.1-Generator is a tool that leverages Azure OpenAI capabilities to transform threat intelligence reports from unstructured web…☆16Updated 3 months ago
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )☆186Updated 10 months ago
- Stupid Simple Detection Testing☆13Updated last year