SigmaHQ/rules/windows
2021-06-15 19:07:50 +05:00
..
builtin Merge pull request #1520 from SyeedHasan/master 2021-06-10 09:51:29 +02:00
create_remote_thread Update Threat Hunter Playbook Reference 2021-05-22 01:00:39 -03:00
create_stream_hash Clean-up service: sysmon as it will be replaced by filling the category 2021-04-15 02:02:25 +02:00
deprecated fix: buggy rule 2020-05-23 18:32:02 +02:00
dns_query NCCGroup rules from rclone blog post 2021-05-27 12:49:40 +02:00
driver_load Update sysmon_vuln_dell_driver_load.yml 2021-05-05 14:31:01 +02:00
file_delete Clean-up service: sysmon as it will be replaced by filling the category 2021-04-15 02:02:25 +02:00
file_event Update sysmon_outlook_newform.yml 2021-06-10 17:41:57 +02:00
image_load Merge branch 'master' into falsepositives_NOT_a_list 2021-05-27 10:23:19 +02:00
malware Merge pull request #1479 from SigmaHQ/rule-devel 2021-05-15 13:42:34 +02:00
network_connection Update Threat Hunter Playbook Reference 2021-05-22 01:02:19 -03:00
other Switched EventID:1 to category: process_creation 2021-06-10 14:13:29 +02:00
pipe_created refactor: reworked CS pipe rule 2021-05-26 17:22:34 +02:00
powershell Merge pull request #1549 from SigmaHQ/rule-devel 2021-06-10 10:19:47 +02:00
process_access fix: several issues 2021-06-14 09:42:25 +02:00
process_creation Removal of NODE from ALL filter for better coverage 2021-06-15 17:07:51 +05:00
raw_access_thread - Remove 'service: sysmon' since defining the categories made the rules generic 2020-10-02 09:37:52 +02:00
registry_event Corrected MITRE reference tag 2021-06-15 19:07:50 +05:00
sysmon forget to add modified 2021-06-10 17:27:15 +02:00
wmi_event Merge branch 'master' of https://github.com/SigmaHQ/sigma 2021-04-15 01:25:48 +02:00