humpalum / vscode-sigmaLinks
☆16Updated 4 months ago
Alternatives and similar repositories for vscode-sigma
Users that are interested in vscode-sigma are comparing it to the libraries listed below
Sorting:
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆80Updated 2 months ago
- The core backend server handling API requests and task management☆43Updated this week
- Jupyter Notebooks for Cyber Threat Intelligence☆35Updated last year
- pySigma Splunk backend☆41Updated 2 months ago
- A home for detection content developed by the delivr.to team☆69Updated 2 weeks ago
- ShellSweeping the evil.☆53Updated last year
- Public tools, scripts or code snippets that can help when working with our products☆46Updated 3 months ago
- simple webapp for converting sigma rules into siem queries using the pySigma library☆50Updated last year
- Sigma detection rules for hunting with the threathunting-keywords project☆56Updated 5 months ago
- A pySigma wrapper to manage detection rules.☆40Updated last month
- ☆14Updated 2 years ago
- Security Content for the PEAK Threat Hunting Framework☆32Updated last year
- Scripts to integrate DFIR-IRIS, MISP and TimeSketch☆34Updated 3 years ago
- TIM is a Kusto investigation platform that enables a user to quickly pivot between data sources; annotate their findings; and promotes co…☆23Updated last year
- Offensive Research Guide to Help Defense Improve Detection☆31Updated 2 years ago
- A pySigma wrapper and langchain toolkit for automatic rule creation/translation☆84Updated 2 months ago
- ☆35Updated 9 months ago
- JPCERT/CC public YARA rules repository☆110Updated 7 months ago
- Get-MiniTimeline - Triage Collection and Timeline Generation w/ KAPE☆31Updated last year
- An experimental script to perform bulk parsing of arbitrary file features with YARA and console logging.☆21Updated 2 years ago
- Quick ESXi Log Parser☆24Updated 7 months ago
- Library of threat hunts to get any user started!☆44Updated 4 years ago
- BlackBerry Threat Research & Intelligence☆98Updated last year
- Remote access and Antivirus Logging Database☆42Updated last year
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆35Updated 3 months ago
- This repository contains sample log data that were collected after running adversary simulations in Microsoft 365☆21Updated 10 months ago
- ☆19Updated 3 years ago
- Small-scale threat emulation and detection range built on Elastic and Atomic Redteam.☆38Updated last year
- A list of RMMs designed to be used in automation to build alerts☆112Updated 3 months ago
- YARA rule analyzer to improve rule quality and performance☆102Updated 3 months ago