SIGMA-detection-rules VS security_content

Compare SIGMA-detection-rules vs security_content and see what are their differences.

Our great sponsors
  • InfluxDB - Power Real-Time Data Analytics at Scale
  • WorkOS - The modern identity platform for B2B SaaS
  • SaaSHub - Software Alternatives and Reviews
SIGMA-detection-rules security_content
2 20
266 1,136
- 2.8%
6.4 9.9
about 2 months ago 4 days ago
Python
Creative Commons Zero v1.0 Universal Apache License 2.0
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

SIGMA-detection-rules

Posts with mentions or reviews of SIGMA-detection-rules. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2023-12-04.
  • should we write our own custom rule
    2 projects | /r/cybersecurity | 4 Dec 2023
    I am currently employed as a cyber analyst, and we've recently implemented an Endpoint Detection and Response (EDR) system. Upon closer inspection, I've observed that numerous events are not being flagged as alerts. This raises a crucial question: should I take the initiative to create custom rules to ensure these events are brought to our attention, or should I rely solely on the EDR's intrinsic capabilities to detect and classify threats? As a potential solution, I'm contemplating the implementation of rules based on Sigma, such as those available at the following repository: here. Your insights and experiences on the effectiveness of this approach would be greatly appreciated. Thank you for your time and assistance.
  • Installed Graylog. 7 million log entries per month. Now what?
    5 projects | /r/sysadmin | 27 May 2022
    Depending on whether this is up your alley either look for a MSSP/MDR/Managed BlaBla provider or head on to - https://github.com/splunk/security_content - https://www.elastic.co/guide/en/security/current/prebuilt-rules.html - https://github.com/mdecrevoisier/SIGMA-detection-rules - https://github.com/Azure/Azure-Sentinel to get an idea of what to look for. MITRE ATT&CK and the related DETT&CT should serve as an additional eye opener. Ah yes - forgot the bible on log management from Anton Chuvakin in the above list.

security_content

Posts with mentions or reviews of security_content. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2023-12-10.
  • SIEM content development
    2 projects | /r/SIEM | 10 Dec 2023
    There's a ton of valuable resources out there when searching for "detection engineering", beyond that, check https://research.splunk.com/ to get an idea of a structured and contextual approach. Beyond that, check Rob van Os Magma use case framework and any blog you can find on https://correlatedsecurity.com (Jurgen Visser). Last but not least, anything "awesome" on github, e.g. https://github.com/fabacab/awesome-cybersecurity-blueteam
  • Azure data sources
    1 project | /r/Splunk | 1 Jul 2023
    Some additional reading: - https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2020/07/Azure-Sentinel-whitepaper.pdf - here it from the vendor; solid read as correct log sourcing/scoping is SIEM-vendor agnostic; also check the Sentinel KQL github for inspiration - https://research.splunk.com/ - your new browser startpage - check for Azure/MS/M365 rekated content
  • Okta Data in Splunk( Reports, Alerts and Dashboards)
    1 project | /r/Splunk | 22 Mar 2023
    Indeed, as well as the Okta analytic stories/detections at research.splunk.com. In fact, three new ones published yesterday where Okta and Splunk collaborated on detections.
  • Crowdstrike FDR logs to Splunk vs Splunk UF collecting logs from windows member server
    1 project | /r/crowdstrike | 22 Dec 2022
    Our end goal is to achieve maxium coverage against MITRE mapping. Our mapping is pretty low and the management want to achieve this in a cost effective manner. Our analysts are more comfortable with creating alerts and dashboards using standard wineventlogs. When we talk about FDR, they are like "Rabitt in the headlights". We are planning to achieve by end of 2023. https://github.com/splunk/security_content/blob/develop/docs/mitre-map/coverage.png (highlighted in blue). Some of the coverage comes native with EDR and NDR. We have a different map of that one (esp proactive one).
  • threat hunting DLL search order hijacking
    1 project | /r/crowdstrike | 13 Dec 2022
    So you want to see if the files in this list are not running out of System32 or SysWOW64.
  • frustrated with lack of “entry level” security roles
    1 project | /r/cybersecurity | 26 Oct 2022
    Build a home lab. Phase 1: Get a good server to run VM's on. Use Proxmox as the hypervisor. Get a managed network switch (used ones on eBay are fine). Setup a span port or get a physical network TAP. Install Zeek and capture all the traffic in and out of your house. Look at the logs. Understand them. Use the free version of Suricata IDS. Examine the logs, understand them. Phase 2: Install Splunk (it has a free version). Push all the Zeek/Suricata logs to Splunk with the universal forwarder. Learn how to use Splunk. Learn the query language. Download APPs, analyze data, build dashboards, setup alerts (https://research.splunk.com/). Phase 3: Setup Honeypots, trigger them to learn how they work. Phase 4: Install Windows and Linux desktops and servers. Use the Splunk universal forwarder to dump all the logs into Splunk. Learn the logs, understand them!
  • Learning splunk step by step
    1 project | /r/Splunk | 21 Oct 2022
    Research Lantern
  • Has Splunk provided any Maggie Malware fix or how to detect it ?
    1 project | /r/Splunk | 7 Oct 2022
    Checkout https://research.splunk.com for stuff like this. Just be careful regarding naming, you will more likely find accurate detections searching by the CVE number.
  • Best Way to Learn Query Writing?
    1 project | /r/Splunk | 15 Sep 2022
    We have over 1,000 queries (which we refer to as detections) in our publicly-available GitHub Repository in the following folder: https://github.com/splunk/security_content/tree/develop/detections
  • Splunk Hyper Queries & other SPL nuggets for Security Teams
    2 projects | /r/Splunk | 6 Sep 2022
    As for detection libraries, I find lots of people don't know about https://research.splunk.com/

What are some alternatives?

When comparing SIGMA-detection-rules and security_content you can also consider the following projects:

EVTX-to-MITRE-Attack - Set of EVTX samples (>270) mapped to MITRE ATT&CK tactic and techniques to measure your SIEM coverage or developed new use cases.

atomic-red-team - Small and highly portable detection tests based on MITRE's ATT&CK.

Azure-Sentinel - Cloud-native SIEM for intelligent security analytics for your entire enterprise.

sigma - Main Sigma Rule Repository

PyNite - A 3D structural engineering finite element library for Python.

remote-splunk-search - Search over a remote Splunk server

nvim-splunk-linter - Simple linter for search queries

detection-rules - Rules for Elastic Security's detection engine

ChatGPT-4-Splunk - Splunk TA for sending completion requests to ChatGPT

ZondaPro - Software para calcular las cargas de viento segun CIRSOC 102 - 2005

threathunting-spl - Splunk code (SPL) for serious threat hunters and detection engineers.

Automata - Automatic detection engineering technical state compliance