All Projects → detection-rules → Similar Projects or Alternatives

347 Open source projects that are alternatives of or similar to detection-rules

Ee Outliers
Open-source framework to detect outliers in Elasticsearch events
Stars: ✭ 172 (+405.88%)
SysmonConfigPusher
Pushes Sysmon Configs
Stars: ✭ 59 (+73.53%)
Mutual labels:  threat-hunting, siem
Siem
SIEM Tactics, Techiques, and Procedures
Stars: ✭ 157 (+361.76%)
Mutual labels:  threat-hunting, siem
Threat-Hunting-and-Detection
Repository for threat hunting and detection queries, tools, etc.
Stars: ✭ 261 (+667.65%)
Mutual labels:  threat-hunting, threat-detection
Threathunting Spl
Splunk code (SPL) useful for serious threat hunters.
Stars: ✭ 117 (+244.12%)
Mutual labels:  threat-hunting, siem
SyntheticSun
SyntheticSun is a defense-in-depth security automation and monitoring framework which utilizes threat intelligence, machine learning, managed AWS security services and, serverless technologies to continuously prevent, detect and respond to threats.
Stars: ✭ 49 (+44.12%)
S2AN
S2AN - Mapper of Sigma/Suricata Rules/Signatures ➡️ MITRE ATT&CK Navigator
Stars: ✭ 70 (+105.88%)
Mutual labels:  threat-hunting, sigma
TA-Sysmon-deploy
Deploy and maintain Symon through the Splunk Deployment Sever
Stars: ✭ 31 (-8.82%)
Mutual labels:  splunk, threat-hunting
Openuba
A robust, and flexible open source User & Entity Behavior Analytics (UEBA) framework used for Security Analytics. Developed with luv by Data Scientists & Security Analysts from the Cyber Security Industry. [PRE-ALPHA]
Stars: ✭ 127 (+273.53%)
Mutual labels:  siem, anomaly-detection
Sentinel Attack
Tools to rapidly deploy a threat hunting capability on Azure Sentinel that leverages Sysmon and MITRE ATT&CK
Stars: ✭ 676 (+1888.24%)
Mutual labels:  threat-hunting, siem
blue-teaming-with-kql
Repository with Sample KQL Query examples for Threat Hunting
Stars: ✭ 102 (+200%)
Mutual labels:  threat-hunting, siem
Meerkat
A collection of PowerShell modules designed for artifact gathering and reconnaisance of Windows-based endpoints.
Stars: ✭ 284 (+735.29%)
Mutual labels:  threat-hunting, siem
ansible-splunk-playbook
Install a full Splunk Enterprise Cluster or Universal forwarder using an ansible playbook
Stars: ✭ 34 (+0%)
Mutual labels:  splunk, siem
SIGMA-detection-rules
Set of SIGMA rules (>250) mapped to MITRE Att@k tactic and techniques
Stars: ✭ 97 (+185.29%)
Mutual labels:  threat-hunting, sigma
Kong-API-Manager
Kong API Manager with Prometheus And Graylog
Stars: ✭ 78 (+129.41%)
Mutual labels:  splunk, siem
Azure-Sentinel-4-SecOps
Microsoft Sentinel SOC Operations
Stars: ✭ 140 (+311.76%)
Mutual labels:  threat-hunting, siem
Attackdatamap
A datasource assessment on an event level to show potential coverage or the MITRE ATT&CK framework
Stars: ✭ 264 (+676.47%)
Mutual labels:  threat-hunting, siem
Sigma
Generic Signature Format for SIEM Systems
Stars: ✭ 4,418 (+12894.12%)
Mutual labels:  splunk, siem
thremulation-station
Small-scale threat emulation and detection range built on Elastic and Atomic Redteam.
Stars: ✭ 28 (-17.65%)
Mutual labels:  threat-hunting, threat-detection
siembol
An open-source, real-time Security Information & Event Management tool based on big data technologies, providing a scalable, advanced security analytics framework.
Stars: ✭ 153 (+350%)
Mutual labels:  siem
Mean-Shifted-Anomaly-Detection
Mean-Shifted Contrastive Loss for Anomaly Detection
Stars: ✭ 61 (+79.41%)
Mutual labels:  anomaly-detection
PANDA
PANDA: Adapting Pretrained Features for Anomaly Detection and Segmentation (CVPR 2021)
Stars: ✭ 64 (+88.24%)
Mutual labels:  anomaly-detection
splunk modinput prometheus
A Splunk modular input for ingesting Prometheus metrics
Stars: ✭ 40 (+17.65%)
Mutual labels:  splunk
sqhunter
A simple threat hunting tool based on osquery, Salt Open and Cymon API
Stars: ✭ 64 (+88.24%)
Mutual labels:  threat-hunting
kestrel-lang
Kestrel threat hunting language: building reusable, composable, and shareable huntflows across different data sources and threat intel.
Stars: ✭ 165 (+385.29%)
Mutual labels:  threat-hunting
auditbeat-in-action
Demo for Elastic's Auditbeat and SIEM
Stars: ✭ 24 (-29.41%)
Mutual labels:  siem
splunk-connect-for-ethereum
Splunk Connect for Ethereum
Stars: ✭ 50 (+47.06%)
Mutual labels:  splunk
splunk-hec-go
Splunk HTTP Event Collector (HEC) Golang library
Stars: ✭ 19 (-44.12%)
Mutual labels:  splunk
anomalib
An anomaly detection library comprising state-of-the-art algorithms and features such as experiment management, hyper-parameter optimization, and edge inference.
Stars: ✭ 1,210 (+3458.82%)
Mutual labels:  anomaly-detection
Meta-GDN AnomalyDetection
Implementation of TheWebConf 2021 -- Few-shot Network Anomaly Detection via Cross-network Meta-learning
Stars: ✭ 22 (-35.29%)
Mutual labels:  anomaly-detection
OpenSIEM-Logstash-Parsing
SIEM Logstash parsing for more than hundred technologies
Stars: ✭ 140 (+311.76%)
Mutual labels:  siem
Scrummage
The Ultimate OSINT and Threat Hunting Framework
Stars: ✭ 355 (+944.12%)
Mutual labels:  threat-hunting
deviation-network
Source code of the KDD19 paper "Deep anomaly detection with deviation networks", weakly/partially supervised anomaly detection, few-shot anomaly detection
Stars: ✭ 94 (+176.47%)
Mutual labels:  anomaly-detection
ETWNetMonv3
ETWNetMonv3 is simple C# code for Monitoring TCP Network Connection via ETW & ETWProcessMon/2 is for Monitoring Process/Thread/Memory/Imageloads/TCPIP via ETW + Detection for Remote-Thread-Injection & Payload Detection by VirtualMemAlloc Events (in-memory) etc.
Stars: ✭ 32 (-5.88%)
Mutual labels:  threat-hunting
YaraHunts
Random hunting ordiented yara rules
Stars: ✭ 86 (+152.94%)
Mutual labels:  threat-hunting
FARED for Anomaly Detection
Official source code of "Fast Adaptive RNN Encoder-Decoder for Anomaly Detection in SMD Assembly Machine"
Stars: ✭ 14 (-58.82%)
Mutual labels:  anomaly-detection
Automata
Automatic detection engineering technical state compliance
Stars: ✭ 33 (-2.94%)
Mutual labels:  sigma
A-Hierarchical-Transformation-Discriminating-Generative-Model-for-Few-Shot-Anomaly-Detection
Official pytorch implementation of the paper: "A Hierarchical Transformation-Discriminating Generative Model for Few Shot Anomaly Detection"
Stars: ✭ 42 (+23.53%)
Mutual labels:  anomaly-detection
vault-plugin-splunk
Vault plugin to securely manage Splunk admin accounts and password rotation
Stars: ✭ 23 (-32.35%)
Mutual labels:  splunk
XGBOD
Supplementary material for IJCNN paper "XGBOD: Improving Supervised Outlier Detection with Unsupervised Representation Learning"
Stars: ✭ 59 (+73.53%)
Mutual labels:  anomaly-detection
kaspersky hackathon
https://events.kaspersky.com/hackathon/
Stars: ✭ 25 (-26.47%)
Mutual labels:  anomaly-detection
TA-dmarc
Add-on for ingesting DMARC aggregate reports into Splunk
Stars: ✭ 14 (-58.82%)
Mutual labels:  splunk
PowerGRR
PowerGRR is an API client library in PowerShell working on Windows, Linux and macOS for GRR automation and scripting.
Stars: ✭ 52 (+52.94%)
Mutual labels:  threat-hunting
singular-spectrum-transformation
fast implementation of singular spectrum transformation (change point detection algorithm)
Stars: ✭ 41 (+20.59%)
Mutual labels:  anomaly-detection
twitter-aws-comprehend
An app to analyze tweets using Amazon Comprehend's Sentiment Analysis service
Stars: ✭ 13 (-61.76%)
Mutual labels:  splunk
terraform-splunk-log-export
Deploy Google Cloud log export to Splunk using Terraform
Stars: ✭ 26 (-23.53%)
Mutual labels:  splunk
anomaly-seg
The Combined Anomalous Object Segmentation (CAOS) Benchmark
Stars: ✭ 115 (+238.24%)
Mutual labels:  anomaly-detection
MindMaps
#ThreatHunting #DFIR #Malware #Detection Mind Maps
Stars: ✭ 224 (+558.82%)
Mutual labels:  threat-hunting
CVAE-AnomalyDetection-PyTorch
Example of Anomaly Detection using Convolutional Variational Auto-Encoder (CVAE)
Stars: ✭ 23 (-32.35%)
Mutual labels:  anomaly-detection
hassh-utils
hassh-utils: Nmap NSE Script and Docker image for HASSH - the SSH client/server fingerprinting method (https://github.com/salesforce/hassh)
Stars: ✭ 41 (+20.59%)
Mutual labels:  threat-hunting
traffic
A quick and dirty vehicle speed detector using video + anomaly detection
Stars: ✭ 21 (-38.24%)
Mutual labels:  anomaly-detection
Threathunting-book
Threat hunting Web Windows AD linux ATT&CK TTPs
Stars: ✭ 338 (+894.12%)
Mutual labels:  threat-hunting
tilitools
[ti]ny [li]ttle machine learning [tool]box - Machine learning, anomaly detection, one-class classification, and structured output prediction
Stars: ✭ 40 (+17.65%)
Mutual labels:  anomaly-detection
censys-recon-ng
recon-ng modules for Censys
Stars: ✭ 29 (-14.71%)
Mutual labels:  threat-hunting
RTFM
Official code for 'Weakly-supervised Video Anomaly Detection with Robust Temporal Feature Magnitude Learning' [ICCV 2021]
Stars: ✭ 216 (+535.29%)
Mutual labels:  anomaly-detection
ailia-models
The collection of pre-trained, state-of-the-art AI models for ailia SDK
Stars: ✭ 1,102 (+3141.18%)
Mutual labels:  anomaly-detection
deviation-network-image
Official PyTorch implementation of the paper “Explainable Deep Few-shot Anomaly Detection with Deviation Networks”, weakly/partially supervised anomaly detection, few-shot anomaly detection, image defect detection.
Stars: ✭ 47 (+38.24%)
Mutual labels:  anomaly-detection
Anomaly Detection
anomaly detection with anomalize and Google Trends data
Stars: ✭ 38 (+11.76%)
Mutual labels:  anomaly-detection
GDPatrol
A Lambda-powered Security Orchestration framework for AWS GuardDuty
Stars: ✭ 50 (+47.06%)
Mutual labels:  siem
semantic logger
Semantic Logger is a feature rich logging framework, and replacement for existing Ruby & Rails loggers.
Stars: ✭ 730 (+2047.06%)
Mutual labels:  splunk
1-60 of 347 similar projects