rules
Security rules collection
A repository containing pre-defined security rules and metadata for monitoring and detecting threats
Falco rule repository
99 stars
8 watching
70 forks
Language: Go
last commit: about 1 year ago
Linked from 1 awesome list
Related projects:
| Repository | Description | Stars |
|---|---|---|
| | A tool that generates suspect actions and events to test Falco ruleset security configurations | 97 |
| | A cloud-native runtime security tool that detects and alerts on abnormal behavior and potential security threats in real-time. | 7,460 |
| | Research on bypassing default security rules for Kubernetes using various techniques | 79 |
| | A collection of rules and guidelines for identifying potential security vulnerabilities in software | 115 |
| | A collection of YARA rules for detecting malware and other malicious files. | 9 |
| | A collection of YARA rules for detecting malware and suspicious activity in various environments. | 11 |
| | A curated collection of YARA rules for identifying and flagging malicious code and behavior. | 60 |
| | A repository for collecting and sharing SIEM rules in STIX format for automated translation to Sigma syntax | 90 |
| | A collection of YARA rules for malware analysis and threat intelligence | 10 |
| | A collection of pre-defined rules and masks for password cracking using hashcat. | 530 |
| | A collection of YARA-L 2.0 sample rules and dashboards for threat detection in Google Security Operations | 326 |
| | Provides a set of reusable code components for developing and testing security rules | 1,990 |
| | Contains detection logic and rules for protecting endpoints from malware and ransomware threats | 1,074 |
| | A collection of threat detection rules written in YARA | 13 |
| | A collection of password cracking rules combining various rule sets to provide a comprehensive attack strategy | 1,489 |