grafana / pySigma-backend-loki
pySigma backend for generating Grafana Loki/LogQL rules
☆38Updated last week
Alternatives and similar repositories for pySigma-backend-loki:
Users that are interested in pySigma-backend-loki are comparing it to the libraries listed below
- A standard for reducing log volume without sacrificing analytical capability☆199Updated last year
- ☆175Updated 3 months ago
- kubernetes-for-soc aims to fast-track the learning curve for SOC analysts by enabling them to swiftly grasp the essential concepts and kn…☆51Updated last year
- Docker image for MISP☆122Updated last month
- This is a collection of threat detection rules / rules engines that I have come across.☆281Updated 9 months ago
- Falco rule repository☆108Updated this week
- Security Analytics enables users for detecting security threats on their security event log data. It will also allow them to modify/tailo…☆77Updated this week
- 🧰 Multi Tool Kubernetes Pentest Image☆222Updated 5 months ago
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆269Updated last year
- ALFA stands for Automated Audit Log Forensic Analysis for Google Workspace. You can use this tool to acquire all Google Workspace audit l…☆156Updated this week
- Roota is a public-domain language of threat detection and response that combines native queries from a SIEM, EDR, XDR, or Data Lake with …☆121Updated 7 months ago
- Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Security Management.☆30Updated 4 months ago
- A library of Incident Response notebooks using Jupyter. We will show how you can leverage pre-defined notebook files to guide your incide…☆143Updated last year
- Response Engine for managing threats in your Kubernetes☆148Updated this week
- A cheatsheet containing AWS CloudTrail events that can be used for Incident Response purposes or Detection Engineering.☆67Updated 9 months ago
- The Sigma command line interface based on pySigma☆144Updated last month
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆91Updated last year
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆79Updated last month
- A curated list of resources about detecting threats and defending Kubernetes systems.☆373Updated last year
- Kubernetes audit logging, when you don't control the control plane☆67Updated this week
- Curating Falco rules with MITRE ATT&CK Matrix☆77Updated 11 months ago
- Python library to parse and convert Sigma rules into queries (and whatever else you could imagine)☆430Updated this week
- Helm charts for running open source digital forensic tools in Kubernetes☆85Updated last week
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆326Updated last year
- Automated testing, generation & manipulation of #osquery packs☆72Updated 4 months ago
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆51Updated last month
- ☆40Updated last month
- Threat-informed defense for cloudnative: Reference Implementation of a so-called Honeycluster - for kind (and GKE, RKE2, AKS)☆30Updated this week
- Generate datasets of cloud audit logs for common attacks☆199Updated 6 months ago
- Transform Linux Audit logs for SIEM usage☆745Updated this week