Navigate:
~$SIGMA0.3%

Sigma: Generic signature format for SIEM systems

YAML-based detection rules with SIEM query conversion.

LIVE RANKINGS • 10:20 AM • STEADY
OVERALL
#240
37
SECURITY
#23
9
30 DAY RANKING TREND
ovr#240
·Secur#23
STARS
10.1K
FORKS
2.6K
7D STARS
+31
7D FORKS
+11
See Repo:
Share:

Learn more about Sigma

Sigma is a structured rule format designed to describe log-based detection methods in a platform-independent way. Rules are written in YAML and define patterns for identifying suspicious or malicious activity across log events. The format includes conversion tools that translate Sigma rules into native query languages for various SIEM systems including Elasticsearch, Splunk, and others. The repository maintains over 3000 community-contributed rules organized by category: generic detections, threat hunting rules, emerging threat rules, compliance rules, and placeholder rules.

Sigma

1

Multi-SIEM Backend Conversion

Write detection rules once in YAML and convert to native query languages for Elasticsearch, Splunk, and other SIEMs through modular backends. Eliminates manual rewriting of detections across different platforms.

2

Community Rule Repository

Over 3000 peer-reviewed detection rules covering threat categories and compliance frameworks, organized and maintained by the community. Production-ready rules available without licensing costs or vendor lock-in.

3

Structured YAML Specification

Standardized schema supports flexible field matching, logical operators, and metadata tagging in human-readable format. Rules are simultaneously readable by analysts and parseable by automated tooling.


from sigma.rule import SigmaRule

rule = SigmaRule.from_yaml("""
title: Failed SSH Login
logsource:
    product: linux
    service: sshd
detection:
    selection:
        message: 'Failed password'
    condition: selection
level: low
""")

print(f"Rule: {rule.title}")
print(f"Level: {rule.level}")

vr2026-01-01

Adds 35 new security detection rules covering AMSI bypasses, EDR evasion techniques, Linux privilege escalation, and network scanning.

  • new: AMSI Disabled via Registry Modification
  • new: Cmd Launched with Hidden Start Flags to Suspicious Targets
  • new: Devcon Execution Disabling VMware VMCI Device
  • new: Github Self-Hosted Runner Execution
  • new: HTML File Opened From Download Folder
vr2025-12-01

Adds 33 new detection rules covering AWS GuardDuty, macOS malware, Cisco/FortiGate exploits, and ClickFix/FileFix attack patterns.

  • new: AWS GuardDuty Detector Deleted Or Updated
  • new: Atomic MacOS Stealer - FileGrabber Activity
  • new: Atomic MacOS Stealer - Persistence Indicators
  • new: Cisco ASA/FP SSL VPN Exploit (CVE-2025-20333 / CVE-2025-20362) - Proxy
  • new: DNS Query by Finger Utility
vr2025-11-01

Introduces 34 new detection rules covering AWS security monitoring, Linux system manipulation, and Windows lateral movement techniques.

  • new: AWS Bucket Deleted
  • new: AWS Console Login Monitoring
  • new: AWS ConsoleLogin Failed Authentication
  • new: AWS EnableRegion Command Monitoring
  • new: AWS IAM user with Console Access Login Without MFA


[ EXPLORE MORE ]

Related Repositories

Discover similar tools and frameworks used by developers