detections.ai Background Icon

Community Inspired
AI Enhanced
Better Detections

Share, discover, and build detection rules for any platform. Join a global community of detection engineers building a more secure future, together.

Community

Build better, together

Share your expertise, join groups, and leverage peer-validated detections from a global community of engineers.

Explore Groups

Cloud Threat Hunters

Advanced cloud security detection techniques

1,247 members

PowerShell Experts

PowerShell-based attack detection and analysis

892 members

MITRE ATT&CK Guild

Mapping detections to MITRE framework

2,156 members

Discover

Detections that matter

Find detections from across GitHub, our users, vendors and content creators, all intelligently organized so you find what you need.

Search
SIGMACommunityWindows

PowerShell Lateral Movement

342

Detects suspicious PowerShell execution patterns...

SIGMAby @crash_override

WMI Process Creation

289

Identifies WMI-based process creation for lateral...

KQLby @phiber_optik

Remote Service Creation

237

Monitors for suspicious service installations...

SPLby @detection_eng

PowerShell Encoded Command

189

Identifies base64 encoded PowerShell commands...

SIGMAby @SW52aXRlIENvZGUgV0lO
3 new detections

AI Detection Creation

Transform intelligence to detections

Generate new detections from community and private threat intel with our purpose-built AI models for detection engineers.

Upload Threat Intelligence

Analyze and generate detections

AWS_Threat_Intel.pdf

PDF Document

cloudtrail_logs.json

JSON Log File

Detection_Standards.md

Markdown File