Sigma detection rules for hunting with the threathunting-keywords project
☆59Mar 2, 2025Updated last year
Alternatives and similar repositories for ThreatHunting-Keywords-sigma-rules
Users that are interested in ThreatHunting-Keywords-sigma-rules are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- yara detection rules for hunting with the threathunting-keywords project☆157May 11, 2025Updated 10 months ago
- Sigma rules converted for direct use with Zircolite☆14Updated this week
- Awesome list of keywords and artifacts for Threat Hunting sessions☆648Aug 4, 2025Updated 7 months ago
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆88Mar 11, 2026Updated 2 weeks ago
- Indicators of compromise from to analysis and research by Nextron Threat Research team☆12Sep 17, 2025Updated 6 months ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- A collection of tools, scripts and personal research☆157Feb 2, 2026Updated last month
- Purpleteam scripts simulation & Detection - trigger events for SOC detections☆196Dec 20, 2024Updated last year
- Set of SIGMA rules (>350) mapped to MITRE ATT&CK tactic and techniques☆417Nov 8, 2025Updated 4 months ago
- Knowing which rule should trigger according to the redcannary test☆11Nov 23, 2024Updated last year
- Threat Detection Rules (Snort/Sigma/Yara)☆14Jan 23, 2024Updated 2 years ago
- Repository for threat hunting and detection queries, etc. for Defender for Endpoint and Microsoft Sentinel in KQL(Kusto Query Language).☆806Jan 14, 2026Updated 2 months ago
- ☆54May 14, 2024Updated last year
- Indicators of compromise☆17Jan 29, 2026Updated last month
- A repository of my own Sigma detection rules.☆164Nov 25, 2025Updated 4 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Documentation and tools to curate Sigma rules for Windows event logs into easier to parse rules.☆16Oct 22, 2025Updated 5 months ago
- Hunting Queries for Defender ATP☆83Dec 14, 2025Updated 3 months ago
- CarbonBlack EDR detection rules and response actions☆73Sep 10, 2024Updated last year
- Legacy Sigma Tools (sigmac etc.)☆16May 7, 2023Updated 2 years ago
- ☆22Aug 29, 2024Updated last year
- An opensource sigma conversion tool built using pysigma☆163Updated this week
- A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.☆34Jul 23, 2024Updated last year
- Placeholder for my detection repo and misc detection engineering content☆42Oct 20, 2023Updated 2 years ago
- Sigma rules to share with the community☆124Jan 29, 2025Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Detection Ideas & Rules repository.☆178Sep 10, 2021Updated 4 years ago
- Raw data from Threat Intelligence Reports with automatic reports collection and keyword search across thousands of reports☆160Updated this week
- Short deep dive into Threat Hunting on AWS☆18Oct 15, 2023Updated 2 years ago
- This is a collection of threat detection rules / rules engines that I have come across.☆297May 5, 2024Updated last year
- This repository is for Indicators of Compromise (IOCs) from Zscaler ThreatLabz public reports☆78Jan 26, 2026Updated 2 months ago
- Detection rules and threat hunting queries in Defender XDR and Azure Sentinel☆16Mar 13, 2026Updated 2 weeks ago
- Volatility, on Docker 🐳☆41Nov 20, 2025Updated 4 months ago
- KQL Queries. Microsoft Defender, Microsoft Sentinel☆196Mar 16, 2026Updated last week
- The backend server handling API requests and task management☆59Mar 17, 2026Updated last week
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- sKaleQL is an opinionated template repository for managing, executing, and organizing Kusto Query Language (KQL) queries against Azure Lo…☆19May 20, 2025Updated 10 months ago
- Menu for Thor scanner lite☆20Oct 24, 2025Updated 5 months ago
- All-in-one bundle of MISP, TheHive and Cortex☆170Sep 27, 2022Updated 3 years ago
- Threat Hunting query in Microsoft 365 Defender, XDR. Provide out-of-the-box KQL hunting queries - App, Email, Identity and Endpoint.☆487Nov 22, 2024Updated last year
- A repository to share publicly available Velociraptor detection content☆196Mar 15, 2026Updated last week
- PowerShell script designed to help Incident Responders collect forensic evidence from local and remote Windows devices.☆110Aug 26, 2024Updated last year
- Cloud threat detection visualization from excalidraw☆12Apr 25, 2022Updated 3 years ago