SigmaHQ/rules/windows
2019-04-21 17:42:47 +02:00
..
builtin Revert "New Sigma rule detecting local user creation" 2019-04-21 09:09:25 +02:00
malware Update win_mal_ursnif.yml 2019-04-14 11:51:13 -05:00
other Converted to use the new process_creation data source 2019-03-09 20:57:59 +03:00
powershell Added missing tags and some minor improvements 2019-03-05 23:25:49 +01:00
process_creation Add default path to filter for explorer in exe anomaly rule 2019-04-21 17:42:47 +02:00
sysmon Merge pull request #309 from jmlynch/master 2019-04-17 23:59:27 +02:00