sigma-hunting
CommunityHunt threats with Sigma rules.
Software Engineering#log analysis#elasticsearch#threat hunting#forensics#detection rules#splunk#sigma
Authorjmagly
Version1.0.0
Installs0
System Documentation
What problem does it solve?
This Skill automates the process of applying Sigma detection rules against log sources to identify potential threat activity, saving significant time and effort in threat hunting.
Core Features & Use Cases
- Sigma Rule Application: Executes Sigma rules against various log sources (journald, flat files, Elasticsearch, Splunk).
- Rule Conversion: Translates Sigma rules into backend-specific queries (Elasticsearch, Splunk, grep).
- Threat Triage: Reports matches, ATT&CK technique context, and flags coverage gaps.
- Use Case: Run a comprehensive threat hunt across your system logs for specific MITRE ATT&CK techniques like T1059 (Command and Scripting Interpreter).
Quick Start
Run a full sigma hunt against local logs.
Dependency Matrix
Required Modules
None requiredComponents
scriptsreferencesassets
💻 Claude Code Installation
Recommended: Let Claude install automatically. Simply copy and paste the text below to Claude Code.
Please help me install this Skill: Name: sigma-hunting Download link: https://github.com/jmagly/aiwg/archive/main.zip#sigma-hunting Please download this .zip file, extract it, and install it in the .claude/skills/ directory.
Agent Skills Search Helper
Install a tiny helper to your Agent, search and equip skill from 223,000+ vetted skills library on demand.