Detection rules, YARA signatures, and KQL queries pulled from open-source intel repos. Mapped to MITRE ATT&CK. Refreshed every few hours. Ready for Azure Sentinel.
Sigma rules converted to KQL, YARA signatures, native Sentinel queries, and IOC hunt packages. Sourced and enriched by my local AI agent.
Browse the feed →Which ATT&CK techniques do these rules actually cover? This heatmap answers that question. Click any technique to see the detection rules behind it, or export the whole layer to ATT&CK Navigator.
View the heatmap →I built this to show what a detection pipeline looks like when you stop doing it by hand. More about the project and how to get in touch.
Learn more →