sigma-hunting

Community

Hunt threats with Sigma rules.

Authorjmagly
Version1.0.0
Installs0

System Documentation

What problem does it solve?

This Skill automates the process of applying Sigma detection rules against log sources to identify potential threat activity, saving significant time and effort in threat hunting.

Core Features & Use Cases

  • Sigma Rule Application: Executes Sigma rules against various log sources (journald, flat files, Elasticsearch, Splunk).
  • Rule Conversion: Translates Sigma rules into backend-specific queries (Elasticsearch, Splunk, grep).
  • Threat Triage: Reports matches, ATT&CK technique context, and flags coverage gaps.
  • Use Case: Run a comprehensive threat hunt across your system logs for specific MITRE ATT&CK techniques like T1059 (Command and Scripting Interpreter).

Quick Start

Run a full sigma hunt against local logs.

Dependency Matrix

Required Modules

None required

Components

scriptsreferencesassets

💻 Claude Code Installation

Recommended: Let Claude install automatically. Simply copy and paste the text below to Claude Code.

Please help me install this Skill:
Name: sigma-hunting
Download link: https://github.com/jmagly/aiwg/archive/main.zip#sigma-hunting

Please download this .zip file, extract it, and install it in the .claude/skills/ directory.
View Source Repository

Agent Skills Search Helper

Install a tiny helper to your Agent, search and equip skill from 223,000+ vetted skills library on demand.