grafana / pySigma-backend-loki
pySigma backend for generating Grafana Loki/LogQL rules
☆44Updated this week
Alternatives and similar repositories for pySigma-backend-loki:
Users that are interested in pySigma-backend-loki are comparing it to the libraries listed below
- ☆176Updated 5 months ago
- Falco rule repository☆121Updated this week
- Response Engine for managing threats in your Kubernetes☆158Updated last week
- This is a collection of threat detection rules / rules engines that I have come across.☆285Updated 11 months ago
- 🧰 Multi Tool Kubernetes Pentest Image☆229Updated last week
- kubernetes-for-soc aims to fast-track the learning curve for SOC analysts by enabling them to swiftly grasp the essential concepts and kn…☆54Updated last year
- A standard for reducing log volume without sacrificing analytical capability☆204Updated 2 months ago
- A cheatsheet containing AWS CloudTrail events that can be used for Incident Response purposes or Detection Engineering.☆72Updated 11 months ago
- Security Analytics enables users for detecting security threats on their security event log data. It will also allow them to modify/tailo…☆81Updated this week
- Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Security Management.☆31Updated 6 months ago
- The Sigma command line interface based on pySigma☆152Updated last week
- ☆73Updated last month
- Generate datasets of cloud audit logs for common attacks☆213Updated 8 months ago
- ☆72Updated 3 months ago
- cloudgrep is grep for cloud storage☆327Updated 2 months ago
- Runtime detection and response for malicious events in Kubernetes workloads☆44Updated last year
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆82Updated 3 months ago
- Kubernetes audit logging, when you don't control the control plane☆74Updated this week
- A curated list of resources about detecting threats and defending Kubernetes systems.☆377Updated last year
- Curating Falco rules with MITRE ATT&CK Matrix☆78Updated last year
- A library of Incident Response notebooks using Jupyter. We will show how you can leverage pre-defined notebook files to guide your incide…☆147Updated last year
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆276Updated last year
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆330Updated last year
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆93Updated last year
- Anvilogic Forge☆103Updated last week
- An implementation of a Windows Event Collector server running on GNU/Linux.☆70Updated this week
- Transform Linux Audit logs for SIEM usage☆761Updated this week
- Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of par…☆253Updated 5 months ago
- Automated testing, generation & manipulation of #osquery packs☆72Updated 6 months ago
- Python library to parse and convert Sigma rules into queries (and whatever else you could imagine)☆446Updated this week