In this repository we will share of threat detection rules in SIGMA format and network Suricata rules. These rules will help to identify suspicious activities in logs from various systems, including Windows, Linux, network devices, and applications.
| Name | Name | Last commit date | ||
|---|---|---|---|---|