Sigma rules to share with the community
☆124Jan 29, 2025Updated last year
Alternatives and similar repositories for Sigma_rules
Users that are interested in Sigma_rules are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A repository of my own Sigma detection rules.☆164Nov 25, 2025Updated 4 months ago
- Rules generated from our investigations.☆207Jun 17, 2025Updated 9 months ago
- Hundred Days of Yara Challenge☆12Jun 21, 2022Updated 3 years ago
- Set of SIGMA rules (>350) mapped to MITRE ATT&CK tactic and techniques☆422Nov 8, 2025Updated 5 months ago
- KQL Detections for Microsoft Sentinel and Microsoft 365 Defender☆21Nov 15, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A YARA rules repository continuously updated for monitoring the old and new threats from articles, incidents responses ...☆141Nov 19, 2023Updated 2 years ago
- Detection Ideas & Rules repository.☆178Sep 10, 2021Updated 4 years ago
- Hunting Queries for Defender ATP☆83Apr 1, 2026Updated last week
- An opensource sigma conversion tool built using pysigma☆163Mar 24, 2026Updated 2 weeks ago
- Cyber Defence related kusto queries for use in Azure Sentinel and Defender advanced hunting☆68Apr 1, 2026Updated last week
- Repository for threat hunting and detection queries, etc. for Defender for Endpoint and Microsoft Sentinel in KQL(Kusto Query Language).☆808Jan 14, 2026Updated 2 months ago
- Sigma Detection Rule Repository☆93Jun 18, 2020Updated 5 years ago
- Sigma rules from Joe Security☆235Nov 4, 2024Updated last year
- Awesome list of keywords and artifacts for Threat Hunting sessions☆650Aug 4, 2025Updated 8 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆88Mar 11, 2026Updated 3 weeks ago
- Sigma detection rules for hunting with the threathunting-keywords project☆59Mar 2, 2025Updated last year
- Online resources related to Detection Engineering. Detection rules, detection logic, attack samples, detection tests and emulation tools…☆158Mar 23, 2026Updated 2 weeks ago
- Repository with Hunting and Detection Queries for Microsoft Sentinel and Microsoft Defender XDR☆17Nov 7, 2025Updated 5 months ago
- A Splunk App containing Sigma detection rules, which can be updated from a Git repository.☆111Feb 6, 2020Updated 6 years ago
- A collection of Tools and Rules for decoding Brute Ratel C4 badgers☆66Jul 7, 2022Updated 3 years ago
- Jupyter notebooks for threat hunting☆60Updated this week
- A Splunk app with saved reports derived from Sigma rules☆73Apr 24, 2018Updated 7 years ago
- KQL Queries. Defender For Endpoint and Azure Sentinel Hunting and Detection Queries in KQL. Out of the box KQL queries for: Advanced Hunt…☆1,679Apr 3, 2026Updated last week
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆552Dec 4, 2023Updated 2 years ago
- A repository to share publicly available Velociraptor detection content☆199Mar 29, 2026Updated last week
- Threat Hunter's Knowledge Base☆22Dec 27, 2021Updated 4 years ago
- ☆15Sep 24, 2024Updated last year
- Threat Detection & Anomaly Detection rules for popular open-source components☆53Jul 27, 2022Updated 3 years ago
- Resources To Learn And Understand SIGMA Rules☆183Feb 14, 2023Updated 3 years ago
- This is a collection of threat detection rules / rules engines that I have come across.☆298May 5, 2024Updated last year
- Hunting queries and detections☆893Oct 30, 2025Updated 5 months ago
- High-level Threat Intelligence playbooks☆20Mar 6, 2021Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Sentinel Threat Intelligence Upload Toolkit☆18Jul 15, 2024Updated last year
- Set of EVTX samples (>270) mapped to MITRE ATT&CK tactic and techniques to measure your SIEM coverage or developed new use cases.☆618Dec 8, 2025Updated 4 months ago
- Detection rules and threat hunting queries in Defender XDR and Azure Sentinel☆16Mar 13, 2026Updated 3 weeks ago
- ☆23Jul 7, 2023Updated 2 years ago
- YARA rule analyzer to improve rule quality and performance☆113Jan 18, 2026Updated 2 months ago
- THOR APT Scanner User Manual☆20Mar 31, 2026Updated last week
- This project aims to compare and evaluate the telemetry of various EDR products.☆1,942Mar 26, 2026Updated 2 weeks ago