SigmaHQ/rules/windows
2021-06-22 22:17:51 +07:00
..
builtin fix ProcessName|endswith 2021-06-21 21:28:46 +02:00
create_remote_thread convert to TargetImage|endswith 2021-06-21 20:51:26 +02:00
create_stream_hash Clean-up service: sysmon as it will be replaced by filling the category 2021-04-15 02:02:25 +02:00
deprecated fix category and TargetImage|endswith 2021-06-21 21:06:54 +02:00
dns_query NCCGroup rules from rclone blog post 2021-05-27 12:49:40 +02:00
driver_load Update sysmon_vuln_dell_driver_load.yml 2021-05-05 14:31:01 +02:00
file_delete Clean-up service: sysmon as it will be replaced by filling the category 2021-04-15 02:02:25 +02:00
file_event Update sysmon_outlook_newform.yml 2021-06-10 17:41:57 +02:00
image_load Merge branch 'master' into falsepositives_NOT_a_list 2021-05-27 10:23:19 +02:00
malware Merge pull request #1479 from SigmaHQ/rule-devel 2021-05-15 13:42:34 +02:00
network_connection Update Threat Hunter Playbook Reference 2021-05-22 01:02:19 -03:00
other Switched EventID:1 to category: process_creation 2021-06-10 14:13:29 +02:00
pipe_created refactor: reworked CS pipe rule 2021-05-26 17:22:34 +02:00
powershell Merge pull request #1549 from SigmaHQ/rule-devel 2021-06-10 10:19:47 +02:00
process_access fix TargetImage|endswith 2021-06-21 21:21:34 +02:00
process_creation Update win_renamed_meg.yml 2021-06-22 22:17:51 +07:00
raw_access_thread - Remove 'service: sysmon' since defining the categories made the rules generic 2020-10-02 09:37:52 +02:00
registry_event fix: remove duplicate status in portproxy reg rule 2021-06-22 08:28:17 +02:00
sysmon Merge pull request #1556 from frack113/PR_617_V2 2021-06-16 08:22:51 +02:00
wmi_event Merge branch 'master' of https://github.com/SigmaHQ/sigma 2021-04-15 01:25:48 +02:00