SigmaHQ/rules/windows
2021-05-27 16:30:09 +02:00
..
builtin fix: dates in new rules 2021-05-27 16:30:09 +02:00
create_remote_thread Update Threat Hunter Playbook Reference 2021-05-22 01:00:39 -03:00
create_stream_hash Clean-up service: sysmon as it will be replaced by filling the category 2021-04-15 02:02:25 +02:00
deprecated fix: buggy rule 2020-05-23 18:32:02 +02:00
dns_query NCCGroup rules from rclone blog post 2021-05-27 12:49:40 +02:00
driver_load Update sysmon_vuln_dell_driver_load.yml 2021-05-05 14:31:01 +02:00
file_delete Clean-up service: sysmon as it will be replaced by filling the category 2021-04-15 02:02:25 +02:00
file_event fix: title with lower case letters 2021-05-27 15:01:32 +02:00
image_load Update Threat Hunter Playbook Reference 2021-05-22 01:01:33 -03:00
malware Merge pull request #1479 from SigmaHQ/rule-devel 2021-05-15 13:42:34 +02:00
network_connection Update Threat Hunter Playbook Reference 2021-05-22 01:02:19 -03:00
other Update and rename rules/windows/other/win_Outlook_C2_Registry_Key.yml to rules/windows/registry_event_write/win_outlook_C2_registry_key.yml 2021-05-04 09:41:38 +02:00
pipe_created refactor: reworked CS pipe rule 2021-05-26 17:22:34 +02:00
powershell fix: duplicate UUIDs 2021-05-27 10:29:21 +02:00
process_access Update win_susp_shell_spawn_from_winrm.yml 2021-05-22 15:28:50 +02:00
process_creation fix: dates in new rules 2021-05-27 16:30:09 +02:00
raw_access_thread - Remove 'service: sysmon' since defining the categories made the rules generic 2020-10-02 09:37:52 +02:00
registry_event fix: duplicate UUIDs 2021-05-27 10:29:21 +02:00
sysmon fix typo of tags 2021-05-24 10:41:17 +02:00
wmi_event Merge branch 'master' of https://github.com/SigmaHQ/sigma 2021-04-15 01:25:48 +02:00