Sigma detection rules for hunting with the threathunting-keywords project
☆60Mar 2, 2025Updated last year
Alternatives and similar repositories for ThreatHunting-Keywords-sigma-rules
Users that are interested in ThreatHunting-Keywords-sigma-rules are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- yara detection rules for hunting with the threathunting-keywords project☆161May 11, 2025Updated 11 months ago
- Sigma rules converted for direct use with Zircolite☆14Updated this week
- Awesome list of keywords and artifacts for Threat Hunting sessions☆655Aug 4, 2025Updated 9 months ago
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆89Mar 11, 2026Updated last month
- Indicators of compromise from to analysis and research by Nextron Threat Research team☆12Sep 17, 2025Updated 7 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Purpleteam scripts simulation & Detection - trigger events for SOC detections☆198Dec 20, 2024Updated last year
- Set of SIGMA rules (>350) mapped to MITRE ATT&CK tactic and techniques☆428Nov 8, 2025Updated 5 months ago
- Knowing which rule should trigger according to the redcannary test☆11Nov 23, 2024Updated last year
- Threat Detection Rules (Snort/Sigma/Yara)☆14Jan 23, 2024Updated 2 years ago
- Repository for threat hunting and detection queries, etc. for Defender for Endpoint and Microsoft Sentinel in KQL(Kusto Query Language).☆812Jan 14, 2026Updated 3 months ago
- ☆54May 14, 2024Updated last year
- Indicators of compromise☆17Jan 29, 2026Updated 3 months ago
- A repository of my own Sigma detection rules.☆165Nov 25, 2025Updated 5 months ago
- Documentation and tools to curate Sigma rules for Windows event logs into easier to parse rules.☆16Oct 22, 2025Updated 6 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Hunting Queries for Defender ATP☆83Apr 1, 2026Updated last month
- CarbonBlack EDR detection rules and response actions☆73Sep 10, 2024Updated last year
- Legacy Sigma Tools (sigmac etc.)☆16May 7, 2023Updated 2 years ago
- ☆22Aug 29, 2024Updated last year
- An opensource sigma conversion tool built using pysigma☆164Apr 22, 2026Updated 2 weeks ago
- A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.☆35Jul 23, 2024Updated last year
- Placeholder for my detection repo and misc detection engineering content☆42Oct 20, 2023Updated 2 years ago
- Sigma rules to share with the community☆125Jan 29, 2025Updated last year
- Detection Ideas & Rules repository.☆178Sep 10, 2021Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Raw data from Threat Intelligence Reports with automatic reports collection and keyword search across thousands of reports☆164Updated this week
- Short deep dive into Threat Hunting on AWS☆19Oct 15, 2023Updated 2 years ago
- This is a collection of threat detection rules / rules engines that I have come across.☆298May 5, 2024Updated 2 years ago
- This repository is for Indicators of Compromise (IOCs) from Zscaler ThreatLabz public reports☆79Jan 26, 2026Updated 3 months ago
- Volatility, on Docker 🐳☆41Nov 20, 2025Updated 5 months ago
- Detection rules and threat hunting queries in Defender XDR and Azure Sentinel☆17Mar 13, 2026Updated last month
- KQL Queries. Microsoft Defender, Microsoft Sentinel☆199Apr 22, 2026Updated 2 weeks ago
- The backend server handling API requests and task management☆62Apr 17, 2026Updated 2 weeks ago
- Hunting queries and detections☆901Oct 30, 2025Updated 6 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Menu for Thor scanner lite☆20Oct 24, 2025Updated 6 months ago
- sKaleQL is an opinionated template repository for managing, executing, and organizing Kusto Query Language (KQL) queries against Azure Lo…☆20May 20, 2025Updated 11 months ago
- All-in-one bundle of MISP, TheHive and Cortex☆168Sep 27, 2022Updated 3 years ago
- Threat Hunting query in Microsoft 365 Defender, XDR. Provide out-of-the-box KQL hunting queries - App, Email, Identity and Endpoint.☆489Nov 22, 2024Updated last year
- A repository to share publicly available Velociraptor detection content☆203Apr 26, 2026Updated last week
- Cloud threat detection visualization from excalidraw☆12Apr 25, 2022Updated 4 years ago
- PowerShell script designed to help Incident Responders collect forensic evidence from local and remote Windows devices.☆113Aug 26, 2024Updated last year