Loading...
Browse 58 detection rules tools
24/7 managed detection & response service with SOC, threat hunting & IR.
Curated attack use case platform that feeds threat scenarios into Jizô AI.
Runs security detections across distributed data sources without SIEM ingestion.
Snort-compatible IDS/IPS rules, PCAPs & exploit library for security testing.
Suite of network security tools for rule mgmt, PCAPs, and traffic analysis.
Windows GUI tool for centralized Snort IDS/IPS rule mgmt across multiple sensors.
Snort-compatible IDS/IPS rules & PCAP library covering 21,000+ proven exploits.
GUI tool for creating, editing & validating Snort IDS/IPS rules.
Cyber range platform for purple team training, APT emulation & detection.
Threat hunting platform with free hunt packages and educational resources.
Detection engineering control plane with CI/CD for SIEM, XDR, and data lakes
AI agent platform for SecOps automation, detection tuning, and threat hunting
AI-powered detection platform for automated rule generation and tuning
Threat intelligence service providing threat profiles and analytics for MDR
IDE for detection engineering with cross-platform translation for 65+ SIEM/EDR/XDR
Threat detection marketplace with Sigma rules for SIEM and shift-left detection
Runs detection & response rules against historical endpoint telemetry data.
Detection ruleset based on Sigma open source community rules
Managed detection ruleset for Windows, Mac, and Linux behavioral threat detection
Creates false positive rules to reduce noise in detection systems
Custom detection & response rule creation platform with sub-100ms response time
Threat-informed detection rule platform for behavioral analytics
Real-time Windows Event Log monitoring with custom detection rules
Security automation platform for automating manual tasks and workflows
Get strategic cybersecurity insights in your inbox