Scripts played by GitHub Actions that converts Sigma rules to SentinelOne PowerQuery via PySigma.
-
Updated
Nov 9, 2024 - Python
Scripts played by GitHub Actions that converts Sigma rules to SentinelOne PowerQuery via PySigma.
A pySigma wrapper and langchain toolkit for automatic rule creation/translation
Sigma detection rules for hunting with the threathunting-keywords project
IOK (Indicator Of Kit) is an open source language and ruleset for detecting phishing threat actor tools and tactics
uberAgent backend for the Sigma rule converter.
This Repository is created to publish SIGMA rules
A command line tool that converts Sigma Rules into STIX 2.1 Objects.
A small script that creates relationships between common CTI knowledge-bases in STIX 2.1 format.
An Autopsy data source ingest module for detection of IOCs in EVTX for Windows and Auditd for Linux based on SIGMA Rules.
Framework definitions that allow to build a custom SIEM.
Web app that allows you to browse and explore the Sigma rules supported by uberAgent ESA's Threat Detection Engine.
Convert Sigma Rules to different formats
SysFlow edge processing pipeline
Repository of Sigma Rules
This repository contains security detection rules I've created, using the flexible and open Sigma standard, designed to enhance consistency and efficiency in security operations across various log files.
a new network detection format (sigma like but for network)
Python tool for analyzing Windows event logs using Sigma rules for threat detection
Add a description, image, and links to the sigma-rules topic page so that developers can more easily learn about it.
To associate your repository with the sigma-rules topic, visit your repo's landing page and select "manage topics."