A POC to implement Detection-as-Code with Terraform and Sumo Logic.
☆31Jul 27, 2023Updated 2 years ago
Alternatives and similar repositories for detection-as-code-example
Users that are interested in detection-as-code-example are comparing it to the libraries listed below
Sorting:
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆60Mar 12, 2022Updated 4 years ago
- ☆56Dec 13, 2025Updated 3 months ago
- pySigma Cookiecutter backend template☆24Sep 17, 2025Updated 6 months ago
- A small crappy script I wrote that converts the Sigma Windows Process Creation events to KQL via PySigma. Designed for CI/CD☆10Nov 7, 2023Updated 2 years ago
- Community content for LogRhythm Axon. Includes Dashboards, searches, analytics rules, processing policies and more.☆10Jul 26, 2024Updated last year
- SigmaHQ pySigma CrowdStrike processing pipeline☆28Nov 30, 2025Updated 3 months ago
- This repository is used by FalconForce to release parts of the internal tools used for maintaining, validating and automatically deployin…☆18Mar 10, 2023Updated 3 years ago
- A guide to simplify the process of evaluating Datadog's Cloud SIEM security capabilities to detect AWS threats.☆20Jul 24, 2023Updated 2 years ago
- Command line tool for working with Panther rules and policies☆48Mar 13, 2026Updated last week
- Automating Security Detection Engineering, published by Packt☆67Oct 12, 2024Updated last year
- Threat Detection & Anomaly Detection rules for popular open-source components☆53Jul 27, 2022Updated 3 years ago
- Collection of example YARA-L rules for use within Google Security Operations☆477Dec 5, 2025Updated 3 months ago
- Scripts written in BASH, PowerShell, Python, and other languages.☆10Aug 5, 2023Updated 2 years ago
- ☆30Jan 13, 2026Updated 2 months ago
- Detection Engineering research, open-source tools, conference presentations, and technical publications shared with the security communit…☆28Dec 17, 2025Updated 3 months ago
- Malware detonation platform Polygon integration☆10Aug 1, 2023Updated 2 years ago
- This repository contains the research and components of our research into using Sigma for AWS Incident Response.☆31Jul 12, 2023Updated 2 years ago
- ☆13Feb 6, 2018Updated 8 years ago
- Safety philosopy: example principles for an organization and management☆13Apr 14, 2025Updated 11 months ago
- A Sigma based detection pipeline☆12Dec 15, 2023Updated 2 years ago
- Log Entry to Sigma Rule Converter☆107Mar 3, 2022Updated 4 years ago
- ⚠️ ARCHIVED**: This repository is no longer actively maintained. All Sigma rules are now managed and available in SIEM Rules☆12Updated this week
- A repository of my own Sigma detection rules.☆163Nov 25, 2025Updated 3 months ago
- A framework and taxonomy for identifying, classifying, and reasoning about detection logic bugs in SIEM, EDR, and XDR rules, with concret…☆45Mar 5, 2026Updated 2 weeks ago
- \B\C\M\C\ Open Source Software☆20Jan 3, 2022Updated 4 years ago
- A companion Github repo for the book - Threat Hunting macOS by Jaron Bradley☆19Jul 26, 2025Updated 7 months ago
- ☆13Sep 10, 2021Updated 4 years ago
- A pySigma wrapper and langchain toolkit for automatic rule creation/translation☆92Nov 3, 2025Updated 4 months ago
- ☆39Mar 2, 2026Updated 2 weeks ago
- ☆14Jan 8, 2026Updated 2 months ago
- Agressor script for Cobalt Strike to mark users as owned in bloodhound from the Cobalt Strike credentials tab.☆12Dec 21, 2019Updated 6 years ago
- Sharing presentation slides and workbook templates that can be useful to others to learn more about Azure Active Directory!☆21Aug 23, 2024Updated last year
- Sigma Detection Rule Repository☆92Jun 18, 2020Updated 5 years ago
- YARA, SIGMA, SNORT Rules based on Malware Analysis☆17Apr 23, 2025Updated 10 months ago
- pySigma Splunk backend☆41Mar 15, 2026Updated last week
- Anvilogic Forge☆116Sep 18, 2025Updated 6 months ago
- The eMASS client repository maintains the Enterprise Mission Assurance Support Service (eMASS) Representational State Transfer (REST) App…☆26Oct 21, 2025Updated 5 months ago
- ☆11Dec 9, 2025Updated 3 months ago
- A Python, Boto3 script that leverages a forensic volume to attach & mount to a selected instance, run a memory dump, unmount and detach f…☆12Jul 15, 2020Updated 5 years ago