Sigma Query Logo

Sigma Query

Searchable repository of Sigma detection rules for threat hunting and SIEM

Security Operations
Free
Visit website
0

Sigma Query Description

SigmaQuery is a comprehensive online repository and search platform for Sigma detection rules maintained by Nextron Systems. The platform provides access to over 3,000 detection rules designed to identify malicious activity across various platforms including Windows, Linux, macOS, cloud environments (AWS, Azure, GCP), and network infrastructure. The rules are categorized by severity levels (Critical, High, Medium, Low, Informational) and maturity status (Stable, Test, Experimental), with extensive coverage of the MITRE ATT&CK framework spanning 385+ techniques. Each rule includes metadata such as author information, creation date, and targeted products. The platform enables security analysts and threat hunters to search, filter, and browse detection rules by multiple criteria including MITRE ATT&CK technique, severity level, product platform, and rule status. Rules cover diverse threat scenarios from credential dumping and lateral movement to persistence mechanisms and defense evasion techniques. The repository includes detection logic for specific threats like the Microsoft Malware Protection Engine crash, LSASS process crashes, suspicious process behaviors, and various attack techniques across operating systems and cloud platforms. SigmaQuery serves as a centralized resource for security operations teams to implement detection capabilities across their SIEM and security monitoring infrastructure.

Sigma Query FAQ

Common questions about Sigma Query including features, pricing, alternatives, and user reviews.

Sigma Query is Searchable repository of Sigma detection rules for threat hunting and SIEM. It is a Security Operations solution designed to help security teams with SIEM, Threat Detection, Threat Hunting.

Have more questions? Browse our categories or search for specific tools.

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Logo

Fractional CISO services for B2B companies to build security programs

Stay Updated with Mandos Brief

Get the latest cybersecurity updates in your inbox

POPULAR

RoboShadow Logo

Automated vulnerability assessment and remediation platform

13
Cybersec Feeds Logo

A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.

7
TestSavant AI Security Assurance Platform Logo

AI security assurance platform for red-teaming, guardrails & compliance

5
OSINTLeak Real-time OSINT Leak Intelligence Logo

Real-time OSINT monitoring for leaked credentials, data, and infrastructure

5
Mandos Brief Logo

Weekly cybersecurity newsletter covering security incidents, AI, and leadership

5
View Popular Tools →