A Yara Lua output script for Suricata
☆20Apr 7, 2019Updated 6 years ago
Alternatives and similar repositories for yara-suricata
Users that are interested in yara-suricata are comparing it to the libraries listed below
Sorting:
- Mass Suricata rules creator, from a list of domain☆14Sep 14, 2018Updated 7 years ago
- Suricata rules to detect Winnti communication☆16Mar 5, 2018Updated 8 years ago
- Suricata LUA scripts to detect CVE-2019-12255, CVE-2019-12256, CVE-2019-12258, and CVE-2019-12260☆19Nov 28, 2019Updated 6 years ago
- Example Suricata rules implementing some of my detection tactics☆22Jan 13, 2023Updated 3 years ago
- Kibana 6 Templates for Suricata IDPS Threat Hunting☆24Mar 5, 2019Updated 7 years ago
- Templates for Kibana/Logstash to use with Suricata IDPS☆81Mar 12, 2016Updated 9 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Sep 17, 2019Updated 6 years ago
- Sankey diagram for Kibana visualize.☆32Dec 5, 2024Updated last year
- Quickly generate suricata rules for IOCs☆28Apr 30, 2021Updated 4 years ago
- ☆12Dec 23, 2021Updated 4 years ago
- ☆12Apr 23, 2020Updated 5 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Apr 18, 2020Updated 5 years ago
- ☆12Jan 28, 2020Updated 6 years ago
- Mikrotik's Winbox in a docker container accessible via noVNC through a web browser.☆13May 12, 2025Updated 9 months ago
- YARA Rule Strings Statistics Calculator and Malware Research Helper☆14Jul 24, 2021Updated 4 years ago
- Snorpy is a python script the gives a Gui interface to help those new to snort create rules.☆66Aug 19, 2024Updated last year
- ☆14Oct 25, 2022Updated 3 years ago
- ☆35Dec 9, 2023Updated 2 years ago
- Passbolt CE installation scripts☆19Mar 16, 2021Updated 4 years ago
- An Ansible playbook for deploying the Suricata intrusion detection system and fetching Snort rules with Oinkmaster.☆17Oct 30, 2021Updated 4 years ago
- A Wireshark Plugin that dissects packets of the LIFX LAN Protocol.☆18Feb 24, 2018Updated 8 years ago
- A set of zeek scripts providing a module for tracking and correlating abnormal DNS behavior.☆35Jan 4, 2025Updated last year
- Kibana 7 Templates for Suricata IDPS Threat Hunting☆43Dec 23, 2025Updated 2 months ago
- A co-simulation framework for reasearching cybersecurity in power grids.☆26Sep 24, 2025Updated 5 months ago
- ☆74Feb 17, 2022Updated 4 years ago
- Zeek network security monitor plugin that enables parsing of the Ethernet/IP and Common Industrial Protocol standards☆46May 30, 2024Updated last year
- A python network scanner using scapy☆24Mar 21, 2020Updated 5 years ago
- Scripts and lists to help generate YARA friendly string mutations☆22Apr 9, 2023Updated 2 years ago
- gonids is a library to parse IDS rules, with a focus primarily on Suricata rule compatibility. There is a discussion forum available that…☆192Jul 18, 2025Updated 7 months ago
- A tools to work on suricata stats.log file.☆29Oct 14, 2015Updated 10 years ago
- ☆70Dec 4, 2018Updated 7 years ago
- Zeek network security monitor plugin that enables parsing of the Tabular Data Stream (TDS) protocol☆25May 30, 2024Updated last year
- THOR Thunderstorm Collectors☆25Feb 26, 2026Updated last week
- OpenWRT Suricata package☆57Feb 19, 2018Updated 8 years ago
- The program allows to download large data from shodan quickly, simply and avoid errors.☆29Nov 3, 2020Updated 5 years ago
- Streaming Unexpected Network Byte Sequences with High Probability of Blue Screening or Otherwise Crashing Attacker Command-and-Control No…☆22Jul 14, 2019Updated 6 years ago
- Duitku Payment gateway for PHPNuxBill☆12Aug 23, 2025Updated 6 months ago
- Suricata rules for network anomaly detection☆183Feb 7, 2026Updated last month
- Exploit framework written in Go☆29Mar 2, 2018Updated 8 years ago