Generates a detailed CSV file containing Sigma Rules statistics for each service or category, and each level, offering a holistic view of the windows rules landscape.
☆10Dec 22, 2023Updated 2 years ago
Alternatives and similar repositories for WinSigmaRuleAnalyzer
Users that are interested in WinSigmaRuleAnalyzer are comparing it to the libraries listed below
Sorting:
- This project aims to bridge the gap between Microsoft Attack Surface Reduction (ASR) rules and MITRE ATT&CK by mapping ASR rules to their…☆29Nov 20, 2024Updated last year
- Cheat sheets for threat hunting, detection and other stuff.☆34Oct 7, 2022Updated 3 years ago
- a Pixie Plus integration for Home Assistant☆12Nov 28, 2025Updated 2 months ago
- ☆14Feb 6, 2026Updated 3 weeks ago
- MISP to Microsoft Defender integration☆16Updated this week
- A small crappy script I wrote that converts the Sigma Windows Process Creation events to KQL via PySigma. Designed for CI/CD☆10Nov 7, 2023Updated 2 years ago
- KQL queries for Microsoft Defender Advanced Hunting organized around the TTPs of the MITRE ATT&CK framework.☆18Nov 7, 2024Updated last year
- This project contains a **test executable** specifically designed to trigger incidents in **Microsoft Defender for Endpoint (MDE)**. It…☆14Jul 20, 2025Updated 7 months ago
- A repository of my own Sigma detection rules.☆163Nov 25, 2025Updated 3 months ago
- Threat Hunting with Elastic Stack, Published by Packt☆41Jan 18, 2023Updated 3 years ago
- Modeling, analyzing and rendering attack trees.☆11Sep 9, 2021Updated 4 years ago
- Windows / Linux Local Privilege Escalation Workshop☆11Jan 15, 2019Updated 7 years ago
- ☆12Feb 9, 2025Updated last year
- A PowerShell Module for OneTimeSecret.com☆10Jun 19, 2021Updated 4 years ago
- Simple script to generate commands to achieve reverse shells.☆12Aug 12, 2019Updated 6 years ago
- CVE-2025-64155: Fortinet FortiSIEM Argument Injection to Remote Code Execution☆30Jan 13, 2026Updated last month
- ☆11Apr 22, 2022Updated 3 years ago
- A Sigma based detection pipeline☆13Dec 15, 2023Updated 2 years ago
- ☆12Jan 5, 2021Updated 5 years ago
- Build K3s image using Packer☆13Nov 25, 2025Updated 3 months ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- Supports Daikin Air Conditioners that use SKYFi via HomeBridge☆10Feb 22, 2020Updated 6 years ago
- ☆14Jan 18, 2020Updated 6 years ago
- Placeholder for my detection repo and misc detection engineering content☆42Oct 20, 2023Updated 2 years ago
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆57Feb 19, 2026Updated last week
- Sensor Mappings to ATT&CK is a collection of resources to assist cyber defenders with understanding which sensors and events can help det…☆51Jun 21, 2025Updated 8 months ago
- ☆12Aug 22, 2017Updated 8 years ago
- Fake SMB and SAMR data☆11Oct 27, 2019Updated 6 years ago
- Create a Word document showing your Sentinel configuration☆14Nov 7, 2023Updated 2 years ago
- The idea is simply to save some quick notes that will make it easier for Splunk users to leverage KQL (Kusto), especially giving projects…☆44Nov 7, 2020Updated 5 years ago
- my MSTICpy practice and custom tools repository☆11Apr 23, 2025Updated 10 months ago
- ☆39Sep 10, 2025Updated 5 months ago
- This is a GUI Interface created with Visual Basic that can be used to track the killer's IP address.☆17Sep 6, 2025Updated 5 months ago
- Domaintools addon for Maltego☆15Sep 13, 2012Updated 13 years ago
- Dast tool☆13Jul 28, 2023Updated 2 years ago
- ☆11Jun 12, 2023Updated 2 years ago
- This is an opensource project allowing you to compare two LLM's head to head with a given prompt, it has a wide range of supported models…☆25Mar 24, 2025Updated 11 months ago
- The cActiveDirectorySecurity module contains PowerShell Functions which are designed to report on and manipulate Access Control Lists on …☆11Aug 31, 2018Updated 7 years ago
- An automated deployment tool that creates instrumented Azure environments with vulnerable systems for simulating attacks and testing Micr…☆62Jul 27, 2025Updated 7 months ago