FaresMorcy
CtrlK
  • Whoami
  • Footprinting Labs
  • Shells & Payloads
  • Password Attacks
  • Active Directory Enumeration & Attacks
  • SOC Hackthebox Notes & Labs
    • Security Monitoring & SIEM Fundamentals Module
    • Windows Event Logs & Finding Evil Module
    • Introduction to Threat Hunting & Hunting With Elastic Module
    • Understanding Log Sources & Investigating with Splunk Module
    • Windows Attacks & Defense
    • Intro to Network Traffic Analysis Module
    • YARA & Sigma for SOC Analysts Module
      • Developing YARA Rules
      • Hunting Evil with YARA (Windows Edition)
      • Hunting Evil with YARA (Linux Edition)
      • Sigma and Sigma Rules
      • Developing Sigma Rules
      • Hunting Evil with Sigma (Chainsaw Edition)
      • Hunting Evil with Sigma (Splunk Edition)
      • Skills Assessment
  • Malicious Document Analysis - HTB Notes
  • Build Home Lab - SOC Automation
  • Home Lab (Attack & Defense Scenarios)
  • Home Lab (Active Directory Scenarios)
  • Build ELK Lab
  • CyberDefenders
  • TryHackme Rooms
  • Powershell Scripting Fundamentals
  • Practical Windows Forensics
  • Hackthebox Rooms
  • WEInnovate Training
  • TryHackme SOC 1
  • TryHackme SOC 2
Powered by GitBook
On this page
  1. SOC Hackthebox Notes & Labs

YARA & Sigma for SOC Analysts Module

Developing YARA RulesHunting Evil with YARA (Windows Edition)Hunting Evil with YARA (Linux Edition)Sigma and Sigma RulesDeveloping Sigma RulesHunting Evil with Sigma (Chainsaw Edition)Hunting Evil with Sigma (Splunk Edition)Skills Assessment
PreviousIntro to Network Traffic Analysis ModuleNextDeveloping YARA Rules