grafana / pySigma-backend-lokiLinks
pySigma backend for generating Grafana Loki/LogQL rules
☆47Updated this week
Alternatives and similar repositories for pySigma-backend-loki
Users that are interested in pySigma-backend-loki are comparing it to the libraries listed below
Sorting:
- Transform Linux Audit logs for SIEM usage☆802Updated last month
- Falco rule repository☆142Updated last week
- A curated list of resources about detecting threats and defending Kubernetes systems.☆397Updated 2 years ago
- ⚡️ Catalyst is a self-hosted, open source incident response platform and ticket system that helps to automate alert handling and incident…☆486Updated 2 weeks ago
- A standard for reducing log volume without sacrificing analytical capability☆211Updated 8 months ago
- Production-ready detection & response queries for osquery☆593Updated 2 months ago
- Tool for building Kubernetes attack paths☆921Updated last week
- Helm charts for running open source digital forensic tools in Kubernetes☆166Updated last week
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆336Updated 6 months ago
- 🧰 Multi Tool Kubernetes Pentest Image☆245Updated 2 months ago
- Response Engine for managing threats in your Kubernetes☆180Updated this week
- This is a collection of threat detection rules / rules engines that I have come across.☆299Updated last year
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆285Updated last year
- Deep Linux runtime visibility meets Wireshark☆295Updated 3 months ago
- Streamline vulnerability patching with CVSS, EPSS, and CISA's Known Exploited Vulnerabilities. Prioritize actions based on real-time thre…☆677Updated last month
- Python library to parse and convert Sigma rules into queries (and whatever else you could imagine)☆493Updated last week
- The TTPForge is a Cybersecurity Framework for developing, automating, and executing attacker Tactics, Techniques, and Procedures (TTPs).☆401Updated last week
- Generate datasets of cloud audit logs for common attacks☆222Updated last year
- Security Analytics enables users for detecting security threats on their security event log data. It will also allow them to modify/tailo…☆91Updated this week
- CNAPPgoat is an open source project designed to modularly provision vulnerable-by-design components in cloud environments.☆289Updated last year
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )☆221Updated last year
- Stand up a simple Elastic container with Kibana, Fleet, and the Detection Engine☆489Updated last month
- Validate the isolation posture of your container environment.☆303Updated 2 months ago
- CloudGrappler is a purpose-built tool designed for effortless querying of high-fidelity and single-event detections related to well-known…☆263Updated 2 months ago
- #supply #chain #attack #detection☆564Updated last week
- ☆182Updated 6 months ago
- An implementation of a Windows Event Collector server running on GNU/Linux.☆81Updated 3 weeks ago
- The Sigma command line interface based on pySigma☆164Updated 2 months ago
- A free and open platform for detecting and preventing email attacks like BEC, malware, and credential phishing. Gain visibility and contr…☆235Updated last month
- Supply-Chain Firewall (SCFW) is a tool for preventing the installation of malicious npm and PyPI packages☆171Updated last week