Loading...
Browse 7 sigma tools
EDR platform with EPP capabilities for endpoint threat detection and response
EDR platform with EPP capabilities for endpoint threat detection and response
EDR platform for workstation and server protection with EPP capabilities
EDR platform for workstation and server protection with EPP capabilities
A mapping tool that correlates MITRE ATT&CK techniques with atomic tests and detection rules to analyze security detection coverage.
A mapping tool that correlates MITRE ATT&CK techniques with atomic tests and detection rules to analyze security detection coverage.
Repository for detection content with various types of rules and payloads.
Repository for detection content with various types of rules and payloads.
A curated collection of Sigma & Yara rules and Indicators of Compromise (IOCs) for threat detection and malware identification.
A curated collection of Sigma & Yara rules and Indicators of Compromise (IOCs) for threat detection and malware identification.
A framework for executing cloud attacker tactics, techniques, and procedures (TTPs) that can generate APIs, Sigma detection rules, and documentation from YAML-based definitions.
A framework for executing cloud attacker tactics, techniques, and procedures (TTPs) that can generate APIs, Sigma detection rules, and documentation from YAML-based definitions.
Converts Sigma and Yara rules to CRYPTTECH's SIEM query language.
Converts Sigma and Yara rules to CRYPTTECH's SIEM query language.
Get strategic cybersecurity insights in your inbox
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance