Sigma detection rules for hunting with the threathunting-keywords project
☆59Mar 2, 2025Updated last year
Alternatives and similar repositories for ThreatHunting-Keywords-sigma-rules
Users that are interested in ThreatHunting-Keywords-sigma-rules are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- yara detection rules for hunting with the threathunting-keywords project☆159May 11, 2025Updated 11 months ago
- Sigma rules converted for direct use with Zircolite☆14Updated this week
- Awesome list of keywords and artifacts for Threat Hunting sessions☆653Aug 4, 2025Updated 8 months ago
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆88Mar 11, 2026Updated last month
- Indicators of compromise from to analysis and research by Nextron Threat Research team☆12Sep 17, 2025Updated 6 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Purpleteam scripts simulation & Detection - trigger events for SOC detections☆196Dec 20, 2024Updated last year
- Set of SIGMA rules (>350) mapped to MITRE ATT&CK tactic and techniques☆422Nov 8, 2025Updated 5 months ago
- Knowing which rule should trigger according to the redcannary test☆11Nov 23, 2024Updated last year
- Threat Detection Rules (Snort/Sigma/Yara)☆14Jan 23, 2024Updated 2 years ago
- Repository for threat hunting and detection queries, etc. for Defender for Endpoint and Microsoft Sentinel in KQL(Kusto Query Language).☆808Jan 14, 2026Updated 3 months ago
- ☆54May 14, 2024Updated last year
- Indicators of compromise☆17Jan 29, 2026Updated 2 months ago
- A repository of my own Sigma detection rules.☆165Nov 25, 2025Updated 4 months ago
- Documentation and tools to curate Sigma rules for Windows event logs into easier to parse rules.☆15Oct 22, 2025Updated 5 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Hunting Queries for Defender ATP☆83Apr 1, 2026Updated 2 weeks ago
- CarbonBlack EDR detection rules and response actions☆73Sep 10, 2024Updated last year
- Legacy Sigma Tools (sigmac etc.)☆16May 7, 2023Updated 2 years ago
- ☆22Aug 29, 2024Updated last year
- An opensource sigma conversion tool built using pysigma☆164Mar 24, 2026Updated 3 weeks ago
- A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.☆34Jul 23, 2024Updated last year
- Placeholder for my detection repo and misc detection engineering content☆42Oct 20, 2023Updated 2 years ago
- Sigma rules to share with the community☆124Jan 29, 2025Updated last year
- Detection Ideas & Rules repository.☆178Sep 10, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Raw data from Threat Intelligence Reports with automatic reports collection and keyword search across thousands of reports☆162Updated this week
- Short deep dive into Threat Hunting on AWS☆19Oct 15, 2023Updated 2 years ago
- This is a collection of threat detection rules / rules engines that I have come across.