frkncelik / Sigma-RuleView external linksLinks
You can access the sigma rules to detect malicious activities. It is organized by Mitre Att&ck categories.
☆13Feb 7, 2022Updated 4 years ago
Alternatives and similar repositories for Sigma-Rule
Users that are interested in Sigma-Rule are comparing it to the libraries listed below
Sorting:
- Resilient Automation Functions and Scripts☆15Jan 5, 2022Updated 4 years ago
- Using QRadar API☆20Feb 23, 2018Updated 7 years ago
- Indicator of Compromise Scanner for CVE-2019-19781☆58Mar 25, 2020Updated 5 years ago
- ☆19Oct 23, 2020Updated 5 years ago
- A repo for security analytics & threat hunting resources☆21Sep 25, 2018Updated 7 years ago
- Liberating dem proprietary APT implants☆20Dec 17, 2019Updated 6 years ago
- ☆29Jul 11, 2015Updated 10 years ago
- Examples for the CyCLI Powershell module☆12Mar 8, 2019Updated 6 years ago
- ☆10Jul 8, 2024Updated last year
- S2AN - Mapper of Sigma/Suricata Rules/Signatures ➡️ MITRE ATT&CK Navigator☆91Dec 8, 2022Updated 3 years ago
- Automate Checkmarx Scanning and Onboarding Plus AWS Access☆12Jan 5, 2023Updated 3 years ago
- event shipper for Carbon Black Defense notifications☆10Feb 25, 2023Updated 2 years ago
- CVE-2025-55182-bypass-waf☆30Jan 8, 2026Updated last month
- ☆11Jan 5, 2022Updated 4 years ago
- Anteater is Reconnaissance tool for discovering interesting files and folders in a web application that most likely has been misconfigure…☆13Jun 12, 2024Updated last year
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Jan 14, 2021Updated 5 years ago
- ☆10Dec 24, 2022Updated 3 years ago
- ☆23Jun 28, 2025Updated 7 months ago
- My version of driller using Intel PIN and angrgdb. In "theory" can work with AFL in deferred and persistent mode.☆13Feb 10, 2019Updated 7 years ago
- CVE-2023-23192☆13Mar 27, 2023Updated 2 years ago
- Security Onion Splunk App☆10May 18, 2015Updated 10 years ago
- Meetuplardan arta kalanlar☆42Aug 18, 2025Updated 5 months ago
- A framework that correlates Bro events☆18Oct 25, 2013Updated 12 years ago
- 学习angr用,里面可能啥都有☆10May 8, 2019Updated 6 years ago
- Query the 'PublicWWW' Source Code Search Engine in R☆13May 2, 2018Updated 7 years ago
- Ossec cookbook for Chef, with secure & automated key management☆21Jun 13, 2013Updated 12 years ago
- A comprehensive WiFi penetration testing framework for security professionals☆16Jul 18, 2025Updated 6 months ago
- AcSecurity is a Python module designed to scan applications for common security vulnerabilities. It checks for hardcoded secrets, depende…☆16Aug 29, 2025Updated 5 months ago
- Collect XSS vulnerable parameters from entire domain.☆13Jul 29, 2022Updated 3 years ago
- Code for NDSS' 19 paper: A Systematic Framework to Generate Invariants for Anomaly Detection in Industrial Control Systems☆12Jun 21, 2021Updated 4 years ago
- ☆10Jun 16, 2022Updated 3 years ago
- Implementation for - Mitigating DNS random subdomain DDoS attacks by distinct heavy hitters sketches☆13Oct 9, 2019Updated 6 years ago
- A Splunk App containing Sigma detection rules, which can be updated from a Git repository.☆111Feb 6, 2020Updated 6 years ago
- A Hash Collision Attack is an attempt to find two input strings of a hash function that produce the same hash result. Because hash functi…☆15Dec 7, 2017Updated 8 years ago
- Scan extracted file from Zeek with Yara rules and get statistical analysis for matching files. Optionally, simulate matching malicious fi…☆15Dec 18, 2023Updated 2 years ago
- ☆11Jul 25, 2019Updated 6 years ago
- Open source HIDS tailored for Microsoft Windows and Active Directory☆29Updated this week
- Picus Labs☆44Mar 11, 2021Updated 4 years ago
- Scripts to threat optics stack quickly / abbreviated and automated. Run after APT-Lab-Terraform☆13Oct 24, 2020Updated 5 years ago