A Yara Lua output script for Suricata
☆20Apr 7, 2019Updated 7 years ago
Alternatives and similar repositories for yara-suricata
Users that are interested in yara-suricata are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Suricata rules to detect Winnti communication☆16Mar 5, 2018Updated 8 years ago
- Mass Suricata rules creator, from a list of domain☆14Sep 14, 2018Updated 7 years ago
- Example Suricata rules implementing some of my detection tactics☆22Jan 13, 2023Updated 3 years ago
- YARA Rule Strings Statistics Calculator and Malware Research Helper☆14Jul 24, 2021Updated 4 years ago
- Suricata rule and intel index☆33Mar 17, 2026Updated last month
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Suricata LUA scripts to detect CVE-2019-12255, CVE-2019-12256, CVE-2019-12258, and CVE-2019-12260☆19Nov 28, 2019Updated 6 years ago
- Scripts and lists to help generate YARA friendly string mutations☆22Apr 9, 2023Updated 3 years ago
- ☆10Sep 11, 2021Updated 4 years ago
- A Wireshark Plugin that dissects packets of the LIFX LAN Protocol.☆18Feb 24, 2018Updated 8 years ago
- ☆74Feb 17, 2022Updated 4 years ago
- Templates for Kibana/Logstash to use with Suricata IDPS☆81Mar 12, 2016Updated 10 years ago
- A web frontend to libpcap spool directories as produced by tcpdump or daemonlogger.☆32Updated this week
- A co-simulation framework for reasearching cybersecurity in power grids.☆26Sep 24, 2025Updated 7 months ago
- ☆27Mar 2, 2022Updated 4 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆12Dec 23, 2021Updated 4 years ago
- Kibana 6 Templates for Suricata IDPS Threat Hunting☆24Mar 5, 2019Updated 7 years ago
- scripts to setup servers, as quickly as possible☆10Updated this week
- A collection of Indicators of Compromise (IoCs), most aligning with samples derived from the signatures in the YARA-Signatures repo☆30Jun 11, 2020Updated 5 years ago
- Ingest Nessus files into Elasticsearch using PowerShell!☆19Mar 22, 2026Updated last month
- Quickly generate suricata rules for IOCs☆28Apr 30, 2021Updated 5 years ago
- Passbolt CE installation scripts☆19Mar 16, 2021Updated 5 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Sep 17, 2019Updated 6 years ago
- A python network scanner using scapy☆25Mar 21, 2020Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆11Jun 30, 2016Updated 9 years ago
- Scripts for sharing.☆17Oct 10, 2022Updated 3 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆13Apr 18, 2020Updated 6 years ago
- Streaming Unexpected Network Byte Sequences with High Probability of Blue Screening or Otherwise Crashing Attacker Command-and-Control No…☆22Jul 14, 2019Updated 6 years ago
- Snorpy is a python script the gives a Gui interface to help those new to snort create rules.☆66Aug 19, 2024Updated last year
- Collection of Utilities and Templates to extend HPE's Intelligent Management Center NMS Platform☆12Sep 19, 2018Updated 7 years ago
- ☆12Jan 28, 2020Updated 6 years ago
- ☆15Oct 25, 2022Updated 3 years ago
- A guide on how to write fast and memory friendly YARA rules☆169Feb 11, 2025Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- JSS Autopkg recipes☆12Mar 19, 2026Updated last month
- gonids is a library to parse IDS rules, with a focus primarily on Suricata rule compatibility. There is a discussion forum available that…☆193Jul 18, 2025Updated 9 months ago
- A set of zeek scripts providing a module for tracking and correlating abnormal DNS behavior.☆35Jan 4, 2025Updated last year
- Generic ASM Vulnerability Schema XSLT☆12May 30, 2018Updated 7 years ago
- Actionable analytics designed to combat threats based on MITRE's ATT&CK.☆23Aug 21, 2019Updated 6 years ago
- Sniffpass will alert on cleartext passwords discovered in HTTP POST requests☆17Oct 30, 2023Updated 2 years ago
- ☆23Aug 1, 2020Updated 5 years ago