SavitarX
Ctrlk
LinkedinTryHackme
  • README
  • CERTIFICATIONS & notes
    • My Roadmap to Becoming a Penetration Tester & Red Team
    • Comp Network
    • Red Team
    • Blue Team
      • SOC Analyst
        • Security Monitoring & SIEM Fundamentals
        • Windows Event Logs & Finding Evil
        • Introduction to Threat Hunting & Hunting With Elastic
        • Understanding Log Sources & Investigating with Splunk
        • Windows Attacks & Defense
        • Intro to Network Traffic Analysis
        • Intermediate Network Traffic Analysis
        • Working with IDS/IPS
        • Introduction to Malware Analysis
        • YARA & Sigma for SOC Analysts
          • YARA and YARA Rules
          • Developing YARA Rules
          • Hunting Evil with YARA (Windows Edition)
          • Hunting Evil with YARA (Linux Edition)
          • Hunting Evil with YARA (Web Edition)
          • Sigma and Sigma Rules
          • Developing Sigma Rules
          • Hunting Evil with Sigma (Chainsaw Edition)
          • Hunting Evil with Sigma (Splunk Edition)
        • Introduction to Digital Forensics
        • Detecting Windows Attacks with Splunk
      • DFIR
    • Web Pentesting
  • Writeups
    • Tryhackme
    • HTB Sherlocks
  • Machines to pratice for
    • CPTS Preparation
    • CDSA Preparation
    • OSEP
  • The Computer Science and Engineering program
    • Read this
    • Computer Science
    • Security
Powered by GitBook
On this page
  1. CERTIFICATIONS & notes
  2. Blue Team
  3. SOC Analyst

YARA & Sigma for SOC Analysts

YARA and YARA RulesDeveloping YARA RulesHunting Evil with YARA (Windows Edition)Hunting Evil with YARA (Linux Edition)Hunting Evil with YARA (Web Edition)Sigma and Sigma RulesDeveloping Sigma RulesHunting Evil with Sigma (Chainsaw Edition)Hunting Evil with Sigma (Splunk Edition)
PreviousCreating Detection RulesNextYARA and YARA Rules