A POC to implement Detection-as-Code with Terraform and Sumo Logic.
☆31Jul 27, 2023Updated 2 years ago
Alternatives and similar repositories for detection-as-code-example
Users that are interested in detection-as-code-example are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆61Mar 12, 2022Updated 4 years ago
- ☆55Dec 13, 2025Updated 4 months ago
- Community content for LogRhythm Axon. Includes Dashboards, searches, analytics rules, processing policies and more.☆10Jul 26, 2024Updated last year
- This repository is used by FalconForce to release parts of the internal tools used for maintaining, validating and automatically deployin…☆17Mar 10, 2023Updated 3 years ago
- SigmaHQ pySigma CrowdStrike processing pipeline☆29Nov 30, 2025Updated 5 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Command line tool for working with Panther rules and policies☆48Apr 14, 2026Updated 2 weeks ago
- Automating Security Detection Engineering, published by Packt☆68Oct 12, 2024Updated last year
- Threat Detection & Anomaly Detection rules for popular open-source components☆53Jul 27, 2022Updated 3 years ago
- Collection of example YARA-L rules for use within Google Security Operations☆488Apr 20, 2026Updated last week
- Knowledge base of analytics designed to cover threats based on MITRE's ATT&CK.☆23Dec 13, 2018Updated 7 years ago
- ☆30Jan 13, 2026Updated 3 months ago
- Scripts written in BASH, PowerShell, Python, and other languages.☆10Aug 5, 2023Updated 2 years ago
- Detection Engineering research, open-source tools, conference presentations, and technical publications shared with the security communit…☆28Dec 17, 2025Updated 4 months ago
- This repository contains the research and components of our research into using Sigma for AWS Incident Response.☆31Jul 12, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆13Feb 6, 2018Updated 8 years ago
- Safety philosopy: example principles for an organization and management☆13Apr 14, 2025Updated last year
- Configure and deploy AWS GuardDuty.☆12Sep 9, 2025Updated 7 months ago
- A Sigma based detection pipeline☆12Dec 15, 2023Updated 2 years ago
- Log Entry to Sigma Rule Converter☆107Mar 3, 2022Updated 4 years ago
- A collection of Yara rules I have created so far☆16Oct 26, 2020Updated 5 years ago
- My Notes from Hugging Face AI Agents Course☆19Feb 18, 2025Updated last year
- Living off the False Positive!☆42Apr 3, 2026Updated 3 weeks ago
- ⚠️ ARCHIVED**: This repository is no longer actively maintained. All Sigma rules are now managed and available in SIEM Rules☆12Mar 19, 2026Updated last month
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A repository of my own Sigma detection rules.☆165Nov 25, 2025Updated 5 months ago
- \B\C\M\C\ Open Source Software☆20Jan 3, 2022Updated 4 years ago
- Ansible playbook to convert Sigma rules to ElastAlert rules☆10Feb 5, 2021Updated 5 years ago
- A companion Github repo for the book - Threat Hunting macOS by Jaron Bradley☆20Jul 26, 2025Updated 9 months ago
- ☆12Sep 10, 2021Updated 4 years ago
- ☆13May 9, 2022Updated 3 years ago
- A pySigma wrapper and langchain toolkit for automatic rule creation/translation☆93Nov 3, 2025Updated 5 months ago
- ☆40Apr 14, 2026Updated 2 weeks ago
- ☆14Jan 8, 2026Updated 3 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Agressor script for Cobalt Strike to mark users as owned in bloodhound from the Cobalt Strike credentials tab.☆12Dec 21, 2019Updated 6 years ago
- Sigma Detection Rule Repository☆93Jun 18, 2020Updated 5 years ago
- YARA, SIGMA, SNORT Rules based on Malware Analysis☆17Apr 23, 2025Updated last year
- Anvilogic Forge☆118Mar 31, 2026Updated last month
- Sharing presentation slides and workbook templates that can be useful to others to learn more about Azure Active Directory!☆21Aug 23, 2024Updated last year
- The eMASS client repository maintains the Enterprise Mission Assurance Support Service (eMASS) Representational State Transfer (REST) App…☆27Mar 31, 2026Updated last month
- A Python, Boto3 script that leverages a forensic volume to attach & mount to a selected instance, run a memory dump, unmount and detach f…☆12Jul 15, 2020Updated 5 years ago