marirs / sigma-convert
Convert Sigma Rules to different formats
☆11Updated 9 months ago
Alternatives and similar repositories for sigma-convert
Users that are interested in sigma-convert are comparing it to the libraries listed below
Sorting:
- CyCAT.org API back-end server including crawlers☆29Updated 2 years ago
- ☆12Updated 3 years ago
- CyCAT.org taxonomies☆15Updated 3 years ago
- defendA Data Lake. A firehose pipeline to athena providing enrichment and normalization for security events☆16Updated 2 years ago
- Generate bulk YARA rules from YAML input☆22Updated 5 years ago
- Serverless, real-time, ClamAV+Yara scanning for your S3 Buckets☆31Updated 11 months ago
- ☆18Updated 3 years ago
- Threat Detection Rules (Snort/Sigma/Yara)☆13Updated last year
- A document tagging library☆30Updated last month
- Pythonic way to work with the warning lists defined there: https://github.com/MISP/misp-warninglists☆33Updated 3 months ago
- Golang based web service to scan files with yara rules☆27Updated 7 years ago
- NTFS file system specimens☆13Updated last year
- A Spicy protocol analyzer for WireGuard☆29Updated 4 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated 6 months ago
- Fang and defang indicators of compromise. You can test this project in a GUI here: http://ioc-fanger.hightower.space .☆61Updated last year
- Specifications used in the MISP project including MISP core format☆51Updated 4 months ago
- Indicators of compromise, YARA rules, and Python scripts to supplement the SANS CTI Summit 2021 talk: "xStart when you're ready".☆14Updated 3 years ago
- Threat hunting repo for my independent study on threat hunting with OSQuery☆27Updated 7 years ago
- A collection of my public YARA signatures for various malware families☆29Updated 7 months ago
- An Incident Response tool that visualizes historic process execution evidence (based on Event ID 4688 - Process Creation Event) in a tree…☆60Updated 7 years ago
- ☆33Updated 3 years ago
- Automatic detection engineering technical state compliance☆55Updated 10 months ago
- An elevated STIX representation of the MITRE ATT&CK Groups knowledge base☆23Updated 2 years ago
- Bluehat 2018 Graphs for Security Workshop☆42Updated 6 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago
- Utilizing your Threat data from a MISP instance into CarbonBlack Response by exposing the data in the Threat Intelligence Feed.☆19Updated 2 years ago
- Threat intelligence and threat detection indicators (IOC, IOA)