Sigma_rules
Vulnerability rules
A collection of rules and guidelines for identifying potential security vulnerabilities in software
Sigma rules to share with the community
115 stars
7 watching
14 forks
Language: Python
last commit: 5 months ago Related projects:
Repository | Description | Stars |
---|---|---|
| Defines guidelines for reporting security vulnerabilities on websites | 1,799 |
| A repository containing pre-defined security rules and metadata for monitoring and detecting threats | 99 |
| A collection of YARA rules for malware analysis and threat intelligence | 10 |
| A curated collection of YARA rules for identifying and flagging malicious code and behavior. | 60 |
| A repository of pre-defined YARA rules for detecting malware and other malicious software | 126 |
| A repository of custom Yara rules for malware analysis and research. | 9 |
| Automates the creation of Yara rules from machine learning models trained on malware and benign samples. | 214 |
| Contains detection logic and rules for protecting endpoints from malware and ransomware threats | 1,074 |
| Detects and analyzes command injection vulnerabilities in iRules written in the Tool Command Language (Tcl), allowing for identification of potential security flaws. | 5 |
| Automates the creation of vulnerable web applications for testing and security research purposes. | 84 |
| A collection of YARA-L 2.0 sample rules and dashboards for threat detection in Google Security Operations | 326 |
| Automated tool to test website directory traversal vulnerabilities by injecting user-controlled input into URLs and analyzing responses. | 422 |
| Tools for interacting with Virus Total's Yara rule management system. | 35 |
| Records disclosed OSS-Fuzz vulnerabilities and their impact on versions and commits | 138 |
| Detects known security vulnerabilities in Python dependencies and provides recommendations for remediation. | 1,758 |