Roota is a public-domain language of threat detection and response that combines native queries from a SIEM, EDR, XDR, or Data Lake with standardized metadata and threat intelligence to enable automated translation into other languages
☆138Jul 19, 2024Updated last year
Alternatives and similar repositories for Roota
Users that are interested in Roota are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An IDE and translation engine for detection engineers and threat hunters. Be faster, write smarter, keep 100% privacy.☆188Dec 2, 2025Updated 5 months ago
- Malware detonation platform Polygon integration☆10Aug 1, 2023Updated 2 years ago
- ⚠️ ARCHIVED**: This repository is no longer actively maintained. All Sigma rules are now managed and available in SIEM Rules☆13Mar 19, 2026Updated 2 months ago
- This repository contains OpenIOC rules to aid in hunting for indicators of compromise and TTPs focused on Advanced Persistent Threat grou…☆26Oct 3, 2023Updated 2 years ago
- ICS/OT related Wireshark profiles + adding some other (IT or OT related) Open Source Wireshark Profiles☆18Mar 21, 2025Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A repository of my own Sigma detection rules.☆165Nov 25, 2025Updated 5 months ago
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆61Mar 12, 2022Updated 4 years ago
- This repo contains example of raw event examples and possible translations to the OCSF schema.☆61Jul 31, 2025Updated 9 months ago
- An opensource sigma conversion tool built using pysigma☆165Apr 22, 2026Updated 3 weeks ago
- OCSF Schema WEB Server☆59May 1, 2026Updated 2 weeks ago
- The TTPForge is a Cybersecurity Framework for developing, automating, and executing attacker Tactics, Techniques, and Procedures (TTPs).☆420May 13, 2026Updated last week
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆338May 7, 2026Updated last week
- SigmaHQ pySigma CrowdStrike processing pipeline☆30Nov 30, 2025Updated 5 months ago
- A collection of scripts for the purpose of gathering open source intelligence, to be presented at GrayHat, BSides Denver, and Information…☆25Feb 4, 2021Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Threat Detection & Anomaly Detection rules for popular open-source components☆53Jul 27, 2022Updated 3 years ago
- Open KLara Project☆36Feb 12, 2026Updated 3 months ago
- Sigma Detection Rule Repository☆93Jun 18, 2020Updated 5 years ago
- Threat Detection Rules (Snort/Sigma/Yara)☆14Jan 23, 2024Updated 2 years ago
- Set of SIGMA rules (>350) mapped to MITRE ATT&CK tactic and techniques☆431May 9, 2026Updated last week
- ☆57Dec 13, 2025Updated 5 months ago
- An open-source, real-time Security Information & Event Management tool based on big data technologies, providing a scalable, advanced sec…☆210Apr 3, 2025Updated last year
- Sigma rules to share with the community☆125Jan 29, 2025Updated last year
- A community-driven repository for threat hunting ideas, methodologies, and research that serves as a central gathering place for hunters …☆315May 13, 2026Updated last week
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Detection Engineering is a tactical function of a cybersecurity defense program that involves the design, implementation, and operation o…☆1,195Apr 30, 2026Updated 3 weeks ago
- This is a collection of threat detection rules / rules engines that I have come across.☆298May 5, 2024Updated 2 years ago
- Anvilogic Forge☆118Mar 31, 2026Updated last month
- A detailed list of potentially dangerous file extensions☆18Jun 18, 2025Updated 11 months ago
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE…☆1,219Dec 29, 2025Updated 4 months ago
- Some of my rough notes for Docker threat detection☆51Aug 26, 2023Updated 2 years ago
- Active C2 IoCs☆99Nov 28, 2022Updated 3 years ago
- Python script to automatically create sigma rules from The hive observables☆25Mar 17, 2019Updated 7 years ago
- Framework for Monitoring File Ingestion Source for Yara Matches☆52Mar 10, 2025Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆12May 3, 2026Updated 2 weeks ago
- Adversary Emulation Planner☆40Jan 9, 2026Updated 4 months ago
- Splunk Security Content☆1,623May 14, 2026Updated last week
- ☆19Jan 31, 2025Updated last year
- Draugnet is a lightweight, open-source tool for anonymous cyber threat reporting. Built for the MISP ecosystem, it lets users submit and …☆20Mar 24, 2026Updated last month
- Convert Sigma rules to SIEM queries, directly in your browser.☆115May 14, 2026Updated last week
- snake-core - the real snake☆15Jul 11, 2023Updated 2 years ago