sigma icon indicating copy to clipboard operation
sigma copied to clipboard

Main Sigma Rule Repository

Results 233 sigma issues
Sort by recently updated
recently updated
newest added

### Summary of the Pull Request ### Changelog update: Suspicious Non-Browser Network Communication With Reddit API update: Suspicious Windows Service Tampering update: COM Object Hijacking Via Modification Of Default System...

Rules
Windows

### Summary of the Pull Request Updating the `azure_app_role_added` rule that generates false positives when adding roles to users. With the Microsoft documentation in the rule description, it is indicated...

Rules

### Summary of the Pull Request Detects the modification of registry values DefaultUserName,DefaultPassword and AutoAdminLogon to enable automatic logon. Attacker use this technique to achieve persistence. ### Changelog ### Example...

Rules
Windows

### Summary of the Pull Request This PR update the cache file used to save already archived references with newly archived results ### Changelog chore: archive new rule references and...

…ent flag ### Summary of the Pull Request Updating the `posh_ps_send_mailmessage` rule by considering the `Attachments` flag according to the documentation. The rule wants to detect exfiltration, so I suggest...

Rules
Windows

### Summary of the Pull Request Add 'journalctl --vacuum' to the CommandLine Contains selection in order to also detect the deletion of system logs via the command 'journalctl' with either...

Rules
Linux

add a two images (tar and Compress-Archive) to rule. ### Summary of the Pull Request Add two images (tar and Compress-Archive) to rule for enhancing detection rate. ### Changelog ###...

Rules
Work In Progress

### Summary of the Pull Request setup16.exe as lolbin https://www.hexacorn.com/blog/2024/10/12/the-sweet16-the-oldbin-lolbin-called-setup16-exe/ Potential Command Line Path Traversal Evasion Attempt cover by Rule_Id 1327381e-6ab0-4f38-b583-4c1b8346a56b setup16 NEED a `.lst` file but as I don't...

Rules
Work In Progress
Windows

When examining the Exfiltration Over Alternative Protocol technique, an attacker can use the scp command in Linux to dump OS credentials. According to the log generated by Sysmon for Linux,...

Rules
Work In Progress
Author Input Required
Linux

### Summary of the Pull Request The detection rule which aims to detect the spawning of a Python Pretty TTY (example: python3 -c 'import pty;pty.spawn("/bin/bash")') can be avoided by attackers...

Rules
Linux