dstaulcu / TA-Sigma-SearchesView external linksLinks
A Splunk app with saved reports derived from Sigma rules
☆73Apr 24, 2018Updated 7 years ago
Alternatives and similar repositories for TA-Sigma-Searches
Users that are interested in TA-Sigma-Searches are comparing it to the libraries listed below
Sorting:
- ☆16Apr 16, 2017Updated 8 years ago
- Converts Sigma detection rules to a Splunk alert configuration.☆115May 18, 2020Updated 5 years ago
- ☆14Jul 8, 2016Updated 9 years ago
- "Evolving AppCompat/AmCache data analysis beyond grep"☆209Sep 15, 2021Updated 4 years ago
- Splunk Boss of the SOC v1 data set.☆113Jun 13, 2018Updated 7 years ago
- Splunk app to support presentation at .conf2015 on free security tools and Splunk☆10Sep 24, 2015Updated 10 years ago
- Splunk code (SPL) for serious threat hunters and detection engineers.☆289Jan 15, 2024Updated 2 years ago
- Sources, configuration and how to detect evil things utilizing Microsoft Sysmon.☆937Dec 12, 2023Updated 2 years ago
- A threat hunting / data analysis environment based on Python, Pandas, PySpark and Jupyter Notebook.☆252Jul 19, 2021Updated 4 years ago
- A Splunk App containing Sigma detection rules, which can be updated from a Git repository.☆111Feb 6, 2020Updated 6 years ago
- Extract information from MISP via the API☆16Jul 18, 2016Updated 9 years ago
- Summit Route End Point Protection - Client code☆16Apr 10, 2016Updated 9 years ago
- Exporting MISP event attributes to yara rules usable with Thor apt scanner☆24Mar 27, 2017Updated 8 years ago
- Python script to decode common encoded PowerShell scripts☆217Jun 13, 2018Updated 7 years ago
- Sigma rules to share with the community☆124Jan 29, 2025Updated last year
- Automated Use Case Testing☆171May 1, 2018Updated 7 years ago
- PHP Phishing Framework☆28Dec 28, 2013Updated 12 years ago
- simple webapp for converting sigma rules into siem queries using the pySigma library☆52Sep 1, 2023Updated 2 years ago
- Data validator agains Splunk Common Information Model (CIM)☆78Mar 27, 2024Updated last year
- Deploy and maintain Symon through the Splunk Deployment Sever☆32Jul 30, 2020Updated 5 years ago
- Modern Honey Network deployment with ansible☆12Jun 4, 2022Updated 3 years ago
- Pointer was developed for massive hunting and mapping Cobalt Strike servers exposed on the internet.☆69Apr 12, 2022Updated 3 years ago
- Detecting DNS Spoofing, DNS Tunneling, DNS Exfiltration☆36Sep 28, 2015Updated 10 years ago
- threat language parser☆60Apr 20, 2015Updated 10 years ago
- Risk Based Alerting Supporting Add-On (SA) for Splunk☆44Oct 28, 2021Updated 4 years ago
- A repository to share publicly available Velociraptor detection content☆196Updated this week
- JSON Tools Technology Add-On for Splunk☆10Mar 31, 2021Updated 4 years ago
- How can you track the hunting techniques you come up with?☆13Sep 3, 2017Updated 8 years ago
- Zeek script library for getting the effective TLD of a domain.☆14Apr 12, 2024Updated last year
- Telegram Bot that performs checks of the yararules.com ruleset☆13May 13, 2016Updated 9 years ago
- Python script to automatically create sigma rules from The hive observables☆25Mar 17, 2019Updated 6 years ago
- pocket guide for core threat hunting concepts☆23May 6, 2020Updated 5 years ago
- Yara-Endpoint is a tool useful for incident response as well as anti-malware enpoint base on Yara signatures.☆107Mar 13, 2018Updated 7 years ago
- A Python library to help with some common threat hunting data analysis operations☆141Apr 23, 2023Updated 2 years ago
- A search command for Splunk which will allow you to search Elastic Search and display the results in the Splunk GUI☆70Aug 10, 2025Updated 6 months ago
- A list of JARM hashes for different ssl implementations used by some C2/red team tools.☆145Apr 20, 2023Updated 2 years ago
- Powershell Functions to interact with TheHive-Project☆11Jun 27, 2019Updated 6 years ago
- Python script that gets IOC from MISP and converts it into BRO intel files.☆13Apr 17, 2016Updated 9 years ago
- Summit Route End Point Protection - Server code☆11Apr 10, 2016Updated 9 years ago