Main Sigma Rule Repository
-
Updated
May 6, 2026 - Python
Main Sigma Rule Repository
A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more efficient.
A standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logs
戎码之眼是一个window上的基于att&ck模型的威胁监控工具.有效检测常见的未知威胁与已知威胁.防守方的利剑
Endpoint detection & Malware analysis software
Consolidation of various resources related to Microsoft Sysmon & sample data/log
ThreatSeeker: Threat Hunting via Windows Event Logs
Import and export custom Sysmon configurations using an interactive GUI that lets you build event rules, manage filters, and generate clean XML configs without manually editing Sysmon files.
System Processes Correlation Engine
A log-based Threat Hunting tool
Utility to convert SysInternals' Sysmon binary configuration to XML
Malware sandbox for automated PE/ELF analysis with EDR integration and behavioral monitoring. Open-source alternative to CAPE sandbox.
This is actually a follow-up to "Mapping-Sysmonlogs-to-ATTACK". After you obtain the "syslog.csv" through program in that repository, you can convert the log into a graph structure with relations through this program
Extract logs based off events from sysmon. Comes as a package, cli and ui.
AI-enhanced Azure SOC homelab for phishing detection & response, threat intelligence, and much more using Microsoft Sentinel, Defender XDR, and ANY.RUN.
Machine-learning-based Sysmon host telemetry analysis with DistilBERT and explainability (SHAP, LIME, Ablation, Permutation Importance).
POC framework for detecting LOLBin abuse in Sysmon logs using Splunk SPL. Implements 12 layered checks (signature matching, parent-child anomalies, threat intel, statistical baselines) with risk scoring for automated alert prioritization. Supports standalone Splunk or distributed n8n architecture.
Cloud security labs: DFIR, detection engineering, and SecOps across Azure Sentinel, AWS GuardDuty, and Entra ID
Utilities for working with and testing Sysmon configs against Windows Event Logs
Add a description, image, and links to the sysmon topic page so that developers can more easily learn about it.
To associate your repository with the sysmon topic, visit your repo's landing page and select "manage topics."