grafana / pySigma-backend-lokiLinks
pySigma backend for generating Grafana Loki/LogQL rules
☆46Updated this week
Alternatives and similar repositories for pySigma-backend-loki
Users that are interested in pySigma-backend-loki are comparing it to the libraries listed below
Sorting:
- A curated list of resources about detecting threats and defending Kubernetes systems.☆393Updated 2 years ago
- ⚡️ Catalyst is a self-hosted, open source incident response platform and ticket system that helps to automate alert handling and incident…☆471Updated this week
- This is a collection of threat detection rules / rules engines that I have come across.☆298Updated last year
- Streamline vulnerability patching with CVSS, EPSS, and CISA's Known Exploited Vulnerabilities. Prioritize actions based on real-time thre…☆672Updated 2 months ago
- Falco rule repository☆135Updated this week
- Production-ready detection & response queries for osquery☆587Updated last month
- A standard for reducing log volume without sacrificing analytical capability☆209Updated 7 months ago
- Transform Linux Audit logs for SIEM usage☆790Updated this week
- Tool for building Kubernetes attack paths☆913Updated this week
- Deep Linux runtime visibility meets Wireshark☆294Updated 2 months ago
- CNAPPgoat is an open source project designed to modularly provision vulnerable-by-design components in cloud environments.☆288Updated last year
- Python library to parse and convert Sigma rules into queries (and whatever else you could imagine)☆486Updated this week
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆284Updated last year
- The TTPForge is a Cybersecurity Framework for developing, automating, and executing attacker Tactics, Techniques, and Procedures (TTPs).☆397Updated last week
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )☆215Updated last year
- 🧰 Multi Tool Kubernetes Pentest Image☆246Updated 3 weeks ago
- Stand up a simple Elastic container with Kibana, Fleet, and the Detection Engine☆481Updated 4 months ago
- Generate datasets of cloud audit logs for common attacks☆219Updated last year
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆334Updated 4 months ago
- Repo to hold wazuh manager mcp server☆56Updated this week
- Roota is a public-domain language of threat detection and response that combines native queries from a SIEM, EDR, XDR, or Data Lake with …☆130Updated last year
- CloudGrappler is a purpose-built tool designed for effortless querying of high-fidelity and single-event detections related to well-known…☆262Updated 3 weeks ago
- Collection of example YARA-L rules for use within Google Security Operations☆444Updated this week
- Validate the isolation posture of your container environment.☆299Updated last month
- A tool for preventing the installation of malicious npm and PyPI packages☆162Updated this week
- Mapping of open-source detection rules and atomic tests.☆177Updated 8 months ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆387Updated this week
- Vulnerability-Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streaml…☆372Updated this week
- Curating Falco rules with MITRE ATT&CK Matrix☆84Updated last year
- Security Analytics enables users for detecting security threats on their security event log data. It will also allow them to modify/tailo…☆88Updated this week