rules
Security rules collection
A repository containing pre-defined security rules and metadata for monitoring and detecting threats
Falco rule repository
99 stars
8 watching
70 forks
Language: Go
last commit: 5 months ago
Linked from 1 awesome list
Related projects:
Repository | Description | Stars |
---|---|---|
| A tool that generates suspect actions and events to test Falco ruleset security configurations | 97 |
| A cloud-native runtime security tool that detects and alerts on abnormal behavior and potential security threats in real-time. | 7,460 |
| Research on bypassing default security rules for Kubernetes using various techniques | 79 |
| A collection of rules and guidelines for identifying potential security vulnerabilities in software | 115 |
| A collection of YARA rules for detecting malware and other malicious files. | 9 |
| A collection of YARA rules for detecting malware and suspicious activity in various environments. | 11 |
| A curated collection of YARA rules for identifying and flagging malicious code and behavior. | 60 |
| A repository for collecting and sharing SIEM rules in STIX format for automated translation to Sigma syntax | 90 |
| A collection of YARA rules for malware analysis and threat intelligence | 10 |
| A collection of pre-defined rules and masks for password cracking using hashcat. | 530 |
| A collection of YARA-L 2.0 sample rules and dashboards for threat detection in Google Security Operations | 326 |
| Provides a set of reusable code components for developing and testing security rules | 1,990 |
| Contains detection logic and rules for protecting endpoints from malware and ransomware threats | 1,074 |
| A collection of threat detection rules written in YARA | 13 |
| A collection of password cracking rules combining various rule sets to provide a comprehensive attack strategy | 1,489 |