Detection rules for tracked tradecraft
Each rule maps to one or more ATT&CK techniques used by actors in this catalog. The YAML / YAR / .rules files under detections/ are the canonical artifacts and the intended consumption path (clone the repo, run pySigma / sigmac for Sigma, the yara CLI for YARA, and suricata for the network-layer rules). This page is the discoverability surface — click any rule to inline its source.
Status: experimental. Treat each rule as a starting point and tune false-positives for your environment.
Level