Sigma

Open-source projects categorized as Sigma

Top 17 Sigma Open-Source Projects

  • chainsaw

    Rapidly Search and Hunt through Windows Forensic Artefacts

  • Project mention: Agent event queue is flooded. Check the agent configuration | /r/Wazuh | 2023-06-30
  • hayabusa

    Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.

  • Project mention: Hayabusa: Sigma-based forensics timeline generator for Windows event logs | news.ycombinator.com | 2024-04-24
  • InfluxDB

    Power Real-Time Data Analytics at Scale. Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.

    InfluxDB logo
  • dj-stripe

    dj-stripe automatically syncs your Stripe Data to your local database as pre-implemented Django Models allowing you to use the Django ORM, in your code, to work with the data making it easier and faster.

  • Project mention: Django SaaS Package | /r/django | 2023-06-25

    If you don't want to use Pegasus or another paid product (presumably because of the cost), the packages I'd reach for are django-allauth for login/user stuff and dj-stripe for the Stripe integration. As for teams, there wasn't a library I was happy with so I rolled my own for Pegasus, but some people like django-tenants. It's too heavyweight for my taste as it requires a more complex dev/test/infrastructure setup with Postgres schemas, as opposed to having a single-database and handling multitenancy in the application layer. But there are pros and cons to both approaches.

  • firo

    The privacy-focused cryptocurrency

  • Project mention: Weekly Firo Development Meeting Minutes | /r/FiroProject | 2023-06-17

    Peter continues his work on walletdb refactoring (PR #1239), which optimizes performance by using a single instance of CWalletDB. It is about 90% done and is estimated to be done by the end of the week.

  • WELA

    WELA (Windows Event Log Analyzer): The Swiss Army knife for Windows Event Logs! ゑ羅(ウェラ)

  • tenzir

    Open source security data pipelines.

  • Project mention: Vector: A high-performance observability data pipeline | news.ycombinator.com | 2024-03-17

    We're building something similar at Tenzir, but more for operational security workloads. https://docs.tenzir.com

    Differences to Vector:

    - An agent has optional indexed storage, so you can store your data there and pick it up later. The storage is based on Apache Feather, Parquet's little brother.

    - Pipelines operators both work with data frames (Arrow record batches) or chunks of bytes.

    - Structured pipelines are multi-schema, i.e., a single pipeline can process streams of record batches with different schemas.

  • Zircolite

    A standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logs

  • WorkOS

    The modern identity platform for B2B SaaS. The APIs are flexible and easy-to-use, supporting authentication, user identity, and complex enterprise features like SSO and SCIM provisioning.

    WorkOS logo
  • EnableWindowsLogSettings

    Documentation and scripts to properly enable Windows event logs.

  • Project mention: EnableWindowsLogSettings: Documentation and scripts to properly enable Windows event logs. | /r/blueteamsec | 2023-06-04
  • S1EM

    This project is a SIEM with SIRP and Threat Intel, all in one.

  • Project mention: Homelab Cybersecurity Idea | /r/homelab | 2023-04-28

    Also have an instance of S1EM - https://github.com/V1D1AN/S1EM - running, monitoring my home LAN, firewall etc. It's huge overkill, and your machine may struggle to run it if you ran anything else with it, but might be worth looking at.

  • SIGMA-detection-rules

    Set of SIGMA rules (>320) mapped to MITRE ATT&CK tactic and techniques

  • Project mention: should we write our own custom rule | /r/cybersecurity | 2023-12-04

    I am currently employed as a cyber analyst, and we've recently implemented an Endpoint Detection and Response (EDR) system. Upon closer inspection, I've observed that numerous events are not being flagged as alerts. This raises a crucial question: should I take the initiative to create custom rules to ensure these events are brought to our attention, or should I rely solely on the EDR's intrinsic capabilities to detect and classify threats? As a potential solution, I'm contemplating the implementation of rules based on Sigma, such as those available at the following repository: here. Your insights and experiences on the effectiveness of this approach would be greatly appreciated. Thank you for your time and assistance.

  • hayabusa-rules

    Curated Windows event log Sigma rules used in Hayabusa and Velociraptor.

  • sysmon

    Sysmon and wazuh integration with Sigma sysmon rules [updated] (by sametsazak)

  • Automata

    Automatic detection engineering technical state compliance (by 3CORESec)

  • automathon

    A Python library for simulating and visualizing finite automata

  • sigma-male-grindset-api

  • sigma-convert

    Convert Sigma Rules to different formats

  • sigma-essentials

    Everything you need for the #grindset

  • SaaSHub

    SaaSHub - Software Alternatives and Reviews. SaaSHub helps you find the best software and product alternatives

    SaaSHub logo
NOTE: The open source projects on this list are ordered by number of github stars. The number of mentions indicates repo mentiontions in the last 12 Months or since we started tracking (Dec 2020).

Sigma related posts

Index

What are some of the best open-source Sigma projects? This list will help you:

Project Stars
1 chainsaw 2,547
2 hayabusa 1,922
3 dj-stripe 1,544
4 firo 704
5 WELA 651
6 tenzir 611
7 Zircolite 596
8 EnableWindowsLogSettings 442
9 S1EM 387
10 SIGMA-detection-rules 265
11 hayabusa-rules 108
12 sysmon 55
13 Automata 48
14 automathon 47
15 sigma-male-grindset-api 18
16 sigma-convert 6
17 sigma-essentials 0

Sponsored
SaaSHub - Software Alternatives and Reviews
SaaSHub helps you find the best software and product alternatives
www.saashub.com