detection-rules topic
SigmaFilterCheck
Check Sigma rules for easy-to-bypass whitelists to make them more robust (https://github.com/Neo23x0/sigma)
thiri-notebook
The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat hunting rules.
web_exploit_detector
The Web Exploit Detector is a Node.js application used to detect possible infections, malicious code and suspicious files in web hosting environments
awesomekql
Microsoft Sentinel, Defender for Endpoint - KQL Detection Packs
sublime-platform
A free and open platform for detecting and preventing email attacks like BEC, malware, and credential phishing. Gain visibility and control, hunt for advanced threats, collaborate with the community,...
ThreatHunting-Keywords-sigma-rules
Sigma detection rules for hunting with the threathunting-keywords project
marble
Marble - the real time decision engine for fraud and AML
DefenderATPQueries
Hunting Queries for Defender ATP