You can access the sigma rules to detect malicious activities. It is organized by Mitre Att&ck categories.
☆13Feb 7, 2022Updated 4 years ago
Alternatives and similar repositories for Sigma-Rule
Users that are interested in Sigma-Rule are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Resilient Automation Functions and Scripts☆15Jan 5, 2022Updated 4 years ago
- ☆11Jul 25, 2019Updated 6 years ago
- Examples for the CyCLI Powershell module☆12Mar 8, 2019Updated 7 years ago
- CyLR - Live Response Collection Tool☆10Jul 14, 2020Updated 5 years ago
- Code for NDSS' 19 paper: A Systematic Framework to Generate Invariants for Anomaly Detection in Industrial Control Systems☆13Jun 21, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Indicator of Compromise Scanner for CVE-2019-19781☆58Mar 25, 2020Updated 6 years ago
- A repo for security analytics & threat hunting resources☆21Sep 25, 2018Updated 7 years ago
- ☆10Jun 16, 2022Updated 3 years ago
- ☆19Oct 23, 2020Updated 5 years ago
- ☆11Jan 5, 2022Updated 4 years ago
- Sigma Detection Rule Repository☆93Jun 18, 2020Updated 5 years ago
- ☆14Apr 29, 2020Updated 5 years ago
- Liberating dem proprietary APT implants☆20Dec 17, 2019Updated 6 years ago
- ☆17Jul 17, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- This Library provides python bindings to interact with the Cylance API.☆20Mar 20, 2023Updated 3 years ago
- 有国旗图案的国家区号选择器,包含 250 个国家地区,支持通过名称、拼音、代码、区号搜索。☆20May 29, 2019Updated 6 years ago
- Misc Threat Hunting Resources☆378Jan 26, 2023Updated 3 years ago
- ☆10Dec 24, 2022Updated 3 years ago
- ☆18Oct 20, 2022Updated 3 years ago
- Using QRadar API☆20Feb 23, 2018Updated 8 years ago
- Carbon Black Response IR tool☆56Dec 10, 2020Updated 5 years ago
- S2AN - Mapper of Sigma/Suricata Rules/Signatures ➡️ MITRE ATT&CK Navigator☆91Dec 8, 2022Updated 3 years ago
- Win32 utility for auditing TCP connections☆56Aug 25, 2020Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Repo of python/bash scripts for identifying IoC's in threat feed and other online tools☆26Jul 27, 2020Updated 5 years ago
- Microsoft Office365 Protection Center Audit Log Parser☆27Jul 17, 2023Updated 2 years ago
- parse strace log☆12Oct 16, 2019Updated 6 years ago
- Meetuplardan arta kalanlar☆42Aug 18, 2025Updated 8 months ago
- Repository of scripts/tools that may be useful in Security Operations Centres (SOC)☆57Nov 25, 2020Updated 5 years ago
- ☆17Jan 2, 2020Updated 6 years ago
- AcSecurity is a Python module designed to scan applications for common security vulnerabilities. It checks for hardcoded secrets, depende…☆16Aug 29, 2025Updated 7 months ago
- Script for parsing Symantec Endpoint Protection logs, VBNs, and ccSubSDK database.☆65Dec 21, 2022Updated 3 years ago
- ☆29Jul 11, 2015Updated 10 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- PyVelociraptor contains the python bindings for the Velociraptor API.☆21Apr 8, 2026Updated last week
- ☆14May 23, 2023Updated 2 years ago
- Prepare, Hunt, and Respond - Conceptual model against cyber attacks by JYVSECTEC☆62Jan 10, 2022Updated 4 years ago
- A Splunk App containing Sigma detection rules, which can be updated from a Git repository.☆111Feb 6, 2020Updated 6 years ago
- Scale out security for web deployments using VM-Series firewalls and Azure Application Gateway web load balancer☆31Jan 25, 2024Updated 2 years ago
- Windows Forensics Salt States☆22Updated this week
- Source code of Malware Classification by Learning Semantic and Structural Features of Control Flow Graphs (TrustCom 2021)☆22Mar 17, 2022Updated 4 years ago