FaresMorcy
search
Ctrlk
FaresMorcy
  • Whoami
  • Footprinting Labs
  • Shells & Payloads
  • Password Attacks
  • Active Directory Enumeration & Attacks
  • SOC Hackthebox Notes & Labs
    • Security Monitoring & SIEM Fundamentals Module
    • Windows Event Logs & Finding Evil Module
    • Introduction to Threat Hunting & Hunting With Elastic Module
    • Understanding Log Sources & Investigating with Splunk Module
    • Windows Attacks & Defense
    • Intro to Network Traffic Analysis Module
    • YARA & Sigma for SOC Analysts Module
      • Developing YARA Rules
      • Hunting Evil with YARA (Windows Edition)
      • Hunting Evil with YARA (Linux Edition)
      • Sigma and Sigma Rules
      • Developing Sigma Rules
      • Hunting Evil with Sigma (Chainsaw Edition)
      • Hunting Evil with Sigma (Splunk Edition)
      • Skills Assessment
  • Malicious Document Analysis - HTB Notes
  • Build Home Lab - SOC Automation
  • Home Lab (Attack & Defense Scenarios)
  • Home Lab (Active Directory Scenarios)
  • Build ELK Lab
  • CyberDefenders
  • TryHackme Rooms
  • Powershell Scripting Fundamentals
  • Practical Windows Forensics
  • Hackthebox Rooms
  • WEInnovate Training
  • TryHackme SOC 1
  • TryHackme SOC 2
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. SOC Hackthebox Notes & Labs

YARA & Sigma for SOC Analysts Module

Developing YARA Ruleschevron-rightHunting Evil with YARA (Windows Edition)chevron-rightHunting Evil with YARA (Linux Edition)chevron-rightSigma and Sigma Ruleschevron-rightDeveloping Sigma Ruleschevron-rightHunting Evil with Sigma (Chainsaw Edition)chevron-rightHunting Evil with Sigma (Splunk Edition)chevron-rightSkills Assessmentchevron-right
PreviousIntro to Network Traffic Analysis Modulechevron-leftNextDeveloping YARA Ruleschevron-right