signatures
Here are 95 public repositories matching this topic...
-
Updated
Jun 11, 2020 - C
Instructions show npm install via apt-get: https://scirius.readthedocs.io/en/latest/installation-ce.html
surius-docker use debian:latest as its base: https://github.com/StamusNetworks/suricata-docker/blob/master/Dockerfile
npm fails using the instructions from "read the docs." It would be great to have the install instructions updated as the install on debian:jessie appears to have other inst
-
Updated
Jul 6, 2020 - PHP
-
Updated
May 14, 2020 - C++
-
Updated
Jun 17, 2019 - TypeScript
Thinking of using one of the Project Honeypot PHP classes to detect undesirables. Is there an easy way for me to generate my own blocks and then use the cidram reporting features?
-
Updated
Jun 23, 2020 - Rust
As noted in the FAQ, the exception messages aren't very helpful on Mac.
Every exception thrown from the C++ isn't correctly interpreted by pybind11, and becomes a RuntimeError: caught an unknown exception. (When all we ever actually throw are ValueErrors with descriptive messages.) At the moment this is worked around
-
Updated
Feb 1, 2020 - Go
-
Updated
Jun 12, 2020 - Ruby
-
Updated
Apr 29, 2020 - Go
-
Updated
Sep 12, 2018 - HTML
-
Updated
Jul 4, 2020 - Rust
-
Updated
Jun 15, 2020 - TypeScript
-
Updated
Jul 10, 2018 - Solidity
-
Updated
Jun 9, 2020 - Go
-
Updated
Dec 10, 2019 - Jupyter Notebook
-
Updated
Jul 5, 2020 - Python
-
Updated
Jun 10, 2020 - Rust
Add your signatures
-
Updated
May 4, 2020 - Rust
These functions can be put directly to containers-sig-* packages.
!?as an operator version oflookup//for Map difference
For example, there's this useful operator:
infixl 9 !?
(!?) :: Key k => Map k v -> k -> Maybe v
(!?) m k = lookup k mAnd probably there exist other useful functions with default implementations. We need to collect such functions an
Code size woes
The towered extensions lead to (lots of) duplicated code due to a codegen bug in Nim upstream nim-lang/Nim#13982.
-
Updated
Feb 25, 2019 - JavaScript
-
Updated
Mar 24, 2020 - C
-
Updated
Jul 2, 2020 - Go
-
Updated
Jun 23, 2020 - Rust
-
Updated
Aug 2, 2018
Improve this page
Add a description, image, and links to the signatures topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the signatures topic, visit your repo's landing page and select "manage topics."

Someone should map publicly available EVTX samples to Sigma rules. This would enable us to automatically test the correctness of generated queries.
Known security-related EVTX repositories:
Feel free to extend the list.
Mapping should be:
Sigma rule -> Repository/EVTX ( -> expected matched