Build. Translate.
Operationalize.
A platform for building, translating, testing, and operationalizing detections across Sigma, Splunk, and PySpark — with a dedicated AI Security layer.
Converter
Translate detections instantly
Write once in Sigma, deploy anywhere. Automatic translation to Splunk SPL and PySpark with validation and notes.
title: Suspicious PowerShell Encoded Command
id: det-001
status: stable
logsource:
category: process_creation
product: windows
detection:
selection:
Image|endswith: '\powershell.exe'
CommandLine|contains:
- ' -EncodedCommand '
- ' -enc '
condition: selection
level: highindex=endpoint sourcetype=WinEventLog:Security EventCode=4688 Image="*\powershell.exe" (CommandLine="* -EncodedCommand *" OR CommandLine="* -enc *") | table _time, host, user, CommandLine | sort -_time
Platform
Everything for detection engineering
From writing rules to validating coverage to detecting AI threats — one platform for the full detection lifecycle.
Coverage Framework
Know your detection coverage
Structured visibility across 8 detection layers — from Host OS to AI Security. Map detections to MITRE techniques, identify gaps, and track maturity.
AI Security
Detect threats in AI systems
OWASP Top 10 for LLMs and Agentic AI — with practical monitoring guidance, detection rules, and threat models.
Prompt Injection
Direct and indirect attacks manipulating LLM instructions
Tool Misuse
AI agents exploiting tool permissions for unauthorized actions
Agent Goal Drift
Autonomous agents deviating from intended objectives
Data Exfiltration
Sensitive data extracted through LLM API channels
API Abuse
Rate limit bypass, model DoS, and credential theft
Supply Chain
Poisoned model weights and compromised integrations
Start building detections
Convert your first rule, explore the library, or build in the playground.