grafana / pySigma-backend-lokiLinks
pySigma backend for generating Grafana Loki/LogQL rules
☆50Updated last week
Alternatives and similar repositories for pySigma-backend-loki
Users that are interested in pySigma-backend-loki are comparing it to the libraries listed below
Sorting:
- A curated list of resources about detecting threats and defending Kubernetes systems.☆401Updated 2 years ago
- Transform Linux Audit logs for SIEM usage☆808Updated 3 weeks ago
- ⚡️ Catalyst is a self-hosted, open source incident response platform and ticket system that helps to automate alert handling and incident…☆500Updated 2 weeks ago
- Python library to parse and convert Sigma rules into queries (and whatever else you could imagine)☆514Updated 3 weeks ago
- Falco rule repository☆150Updated this week
- Helm charts for running open source digital forensic tools in Kubernetes☆176Updated this week
- Deep Linux runtime visibility meets Wireshark☆299Updated last month
- The Sigma command line interface based on pySigma☆170Updated last month
- Production-ready detection & response queries for osquery☆597Updated 4 months ago
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆286Updated last year
- A standard for reducing log volume without sacrificing analytical capability☆213Updated 10 months ago
- This is a collection of threat detection rules / rules engines that I have come across.☆298Updated last year
- Validate the isolation posture of your container environment.☆309Updated 2 weeks ago
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )☆223Updated last year
- 🧰 Multi Tool Kubernetes Pentest Image☆251Updated 4 months ago
- A production ready Dockered MISP☆301Updated 2 weeks ago
- Threat-hunting tool for Linux☆1,030Updated last month
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆337Updated 8 months ago
- Tool for building Kubernetes attack paths☆930Updated last month
- A free and open platform for detecting and preventing email attacks like BEC, malware, and credential phishing. Gain visibility and contr…☆242Updated 3 weeks ago
- Generate datasets of cloud audit logs for common attacks☆231Updated this week
- CloudGrappler is a purpose-built tool designed for effortless querying of high-fidelity and single-event detections related to well-known…☆265Updated last month
- The TTPForge is a Cybersecurity Framework for developing, automating, and executing attacker Tactics, Techniques, and Procedures (TTPs).☆409Updated last week
- SOARCA - The Open Source CACAO-based Security Orchestrator!☆100Updated 3 weeks ago
- Streamline vulnerability patching with CVSS, EPSS, and CISA's Known Exploited Vulnerabilities. Prioritize actions based on real-time thre…☆681Updated 3 months ago
- Testing datasets and tools to compare WAF efficacy☆190Updated 9 months ago
- Response Engine for managing threats in your Kubernetes☆187Updated last month
- Collaborative Incident Response platform☆1,357Updated last week
- Collection of example YARA-L rules for use within Google Security Operations☆463Updated last month
- An implementation of a Windows Event Collector server running on GNU/Linux.☆88Updated 2 weeks ago