quadrantsec / sagan-rulesLinks
☆33Updated this week
Alternatives and similar repositories for sagan-rules
Users that are interested in sagan-rules are comparing it to the libraries listed below
Sorting:
- Threat Detection & Anomaly Detection rules for popular open-source components☆52Updated 3 years ago
- The Sigma command line interface based on pySigma☆158Updated 3 months ago
- SIEGMA - Transform Sigma rules into SIEM consumables☆153Updated 4 months ago
- An IDE and translation engine for detection engineers and threat hunters. Be faster, write smarter, keep 100% privacy.☆155Updated 5 months ago
- Awesome Splunk SPL hunt queries that can be used to detect the latest vulnerability exploitation attempts & subsequent compromise☆66Updated last year
- Dettectinator - The Python library to your DeTT&CT YAML files.☆115Updated 3 months ago
- OSSEM Detection Model☆176Updated 2 years ago
- Technical add-on for Splunk related to TheHive/Cortex from TheHive project☆53Updated 2 weeks ago
- Open source endpoint agent providing host information to Zeek. [v2]☆85Updated 3 weeks ago
- Rules generated from our investigations.☆196Updated last month
- Suricata rules for network anomaly detection☆167Updated 3 months ago
- Zeek-Formatted Threat Intelligence Feeds☆374Updated this week
- Apps to be used for Shuffle automation. Most of Shuffle's apps (2500+) are generated from APIs, and available in the search engine below:☆116Updated last week
- OpenCTI Docker deployment helpers☆195Updated this week
- Sigma rules from Joe Security☆217Updated 9 months ago
- The Security Analyst’s Guide to Suricata☆57Updated 3 months ago
- Suricata Language Server is an implementation of the Language Server Protocol for Suricata signatures. It adds syntax check, hints and au…☆78Updated last month
- Pointing cybersecurity teams to thousands of detection rules and offensive security tests aligned with common attacker techniques☆136Updated last year
- 🚌 Threat Bus – A threat intelligence dissemination layer for open-source security tools.☆263Updated 2 years ago
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆47Updated 2 months ago
- Threat Hunting queries for various attacks☆238Updated this week
- The principal objective of this project is to develop a knowledge base of the tactics, techniques, and procedures (TTPs) used by insiders…☆143Updated 3 weeks ago
- ☆126Updated last year
- Convert Sigma rules to Wazuh rules☆67Updated last year
- Docker configurations for TheHive, Cortex and 3rd party tools☆126Updated 2 years ago
- ☆95Updated 2 years ago
- ☆69Updated 5 months ago
- Anything Sysmon related from the MSTIC R&D team☆154Updated last year
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆370Updated this week
- Standard-Format Threat Intelligence Feeds☆121Updated this week