Sigma Query Logo

Sigma Query

Searchable repository of Sigma detection rules for threat hunting and SIEM

Visit website
1
CybersecRadarsCybersecRadars

Go Beyond the Directory. Track the Entire Market.

Monitor competitor funding, hiring signals, product launches, and market movements across the whole industry.

Competitor Tracking·Funding Intelligence·Hiring Signals·Real-time Alerts

Sigma Query Description

SigmaQuery is a comprehensive online repository and search platform for Sigma detection rules maintained by Nextron Systems. The platform provides access to over 3,000 detection rules designed to identify malicious activity across various platforms including Windows, Linux, macOS, cloud environments (AWS, Azure, GCP), and network infrastructure. The rules are categorized by severity levels (Critical, High, Medium, Low, Informational) and maturity status (Stable, Test, Experimental), with extensive coverage of the MITRE ATT&CK framework spanning 385+ techniques. Each rule includes metadata such as author information, creation date, and targeted products. The platform enables security analysts and threat hunters to search, filter, and browse detection rules by multiple criteria including MITRE ATT&CK technique, severity level, product platform, and rule status. Rules cover diverse threat scenarios from credential dumping and lateral movement to persistence mechanisms and defense evasion techniques. The repository includes detection logic for specific threats like the Microsoft Malware Protection Engine crash, LSASS process crashes, suspicious process behaviors, and various attack techniques across operating systems and cloud platforms. SigmaQuery serves as a centralized resource for security operations teams to implement detection capabilities across their SIEM and security monitoring infrastructure.

Sigma Query FAQ

Common questions about Sigma Query including features, pricing, alternatives, and user reviews.

Sigma Query is Searchable repository of Sigma detection rules for threat hunting and SIEM. It is a Security Operations solution designed to help security teams with SIEM, Threat Detection, Threat Hunting.

Have more questions? Browse our categories or search for specific tools.

FEATURED

Heeler Application Security Auto-Remediation Logo

Fix-first AppSec powered by agentic remediation, covering SCA, SAST & secrets.

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

Mandos Fractional CISO Logo

Fractional CISO services for B2B companies to build security programs

POPULAR

RoboShadow Logo

Automated vulnerability assessment and remediation platform

13
OSINTLeak Real-time OSINT Leak Intelligence Logo

Real-time OSINT monitoring for leaked credentials, data, and infrastructure

8
Cybersec Feeds Logo

A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.

6
TestSavant AI Security Assurance Platform Logo

AI security assurance platform for red-teaming, guardrails & compliance

5
Mandos Brief Logo

Weekly cybersecurity newsletter covering security incidents, AI, and leadership

5
View Popular Tools →

Stay Updated with Mandos Brief

Get strategic cybersecurity insights in your inbox