A Yara Lua output script for Suricata
☆20Apr 7, 2019Updated 7 years ago
Alternatives and similar repositories for yara-suricata
Users that are interested in yara-suricata are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Suricata rules to detect Winnti communication☆16Mar 5, 2018Updated 8 years ago
- Mass Suricata rules creator, from a list of domain☆14Sep 14, 2018Updated 7 years ago
- Example Suricata rules implementing some of my detection tactics☆22Jan 13, 2023Updated 3 years ago
- YARA Rule Strings Statistics Calculator and Malware Research Helper☆14Jul 24, 2021Updated 4 years ago
- Suricata rule and intel index☆33Mar 17, 2026Updated last month
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Suricata LUA scripts to detect CVE-2019-12255, CVE-2019-12256, CVE-2019-12258, and CVE-2019-12260☆19Nov 28, 2019Updated 6 years ago
- Sankey diagram for Kibana visualize.☆32Dec 5, 2024Updated last year
- Scripts and lists to help generate YARA friendly string mutations☆22Apr 9, 2023Updated 3 years ago
- ☆10Sep 11, 2021Updated 4 years ago
- ☆74Feb 17, 2022Updated 4 years ago
- Templates for Kibana/Logstash to use with Suricata IDPS☆81Mar 12, 2016Updated 10 years ago
- A web frontend to libpcap spool directories as produced by tcpdump or daemonlogger.☆30Apr 12, 2026Updated last week
- A co-simulation framework for reasearching cybersecurity in power grids.☆26Sep 24, 2025Updated 6 months ago
- ☆12Dec 23, 2021Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Kibana 6 Templates for Suricata IDPS Threat Hunting☆24Mar 5, 2019Updated 7 years ago
- A collection of Indicators of Compromise (IoCs), most aligning with samples derived from the signatures in the YARA-Signatures repo☆30Jun 11, 2020Updated 5 years ago
- Quickly generate suricata rules for IOCs☆28Apr 30, 2021Updated 4 years ago
- Passbolt CE installation scripts☆19Mar 16, 2021Updated 5 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Sep 17, 2019Updated 6 years ago
- ☆35Dec 9, 2023Updated 2 years ago
- Reviews and tests of security products☆17Dec 28, 2024Updated last year
- ☆11Jun 30, 2016Updated 9 years ago
- Scripts for sharing.☆17Oct 10, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆13Apr 18, 2020Updated 6 years ago
- Streaming Unexpected Network Byte Sequences with High Probability of Blue Screening or Otherwise Crashing Attacker Command-and-Control No…☆22Jul 14, 2019Updated 6 years ago
- Snorpy is a python script the gives a Gui interface to help those new to snort create rules.☆66Aug 19, 2024Updated last year
- ☆12Jan 28, 2020Updated 6 years ago
- ☆70Dec 4, 2018Updated 7 years ago
- ☆14Oct 25, 2022Updated 3 years ago
- A guide on how to write fast and memory friendly YARA rules☆167Feb 11, 2025Updated last year
- gonids is a library to parse IDS rules, with a focus primarily on Suricata rule compatibility. There is a discussion forum available that…☆193Jul 18, 2025Updated 9 months ago
- A set of zeek scripts providing a module for tracking and correlating abnormal DNS behavior.☆35Jan 4, 2025Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Generic ASM Vulnerability Schema XSLT☆12May 30, 2018Updated 7 years ago
- Actionable analytics designed to combat threats based on MITRE's ATT&CK.☆23Aug 21, 2019Updated 6 years ago
- Sniffpass will alert on cleartext passwords discovered in HTTP POST requests☆17Oct 30, 2023Updated 2 years ago
- ☆23Aug 1, 2020Updated 5 years ago
- Suricata rules for network anomaly detection☆182Feb 7, 2026Updated 2 months ago
- Zeek network security monitor plugin that enables parsing of the Tabular Data Stream (TDS) protocol☆25May 30, 2024Updated last year
- Standardized Malware Analysis Tool☆56Mar 9, 2021Updated 5 years ago