Community-based CybergON-powered Suricata rules
☆12Jul 5, 2022Updated 3 years ago
Alternatives and similar repositories for Timon-Rules
Users that are interested in Timon-Rules are comparing it to the libraries listed below
Sorting:
- Mass Suricata rules creator, from a list of domain☆14Sep 14, 2018Updated 7 years ago
- suricata IDS的规则,测试在用的,部分自写的规则视情况放出。☆18Apr 16, 2019Updated 6 years ago
- Security information and event management, masters's diploma☆10Aug 3, 2015Updated 10 years ago
- Mini country flags in ascii art (3x1 characters)☆17Aug 20, 2015Updated 10 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Sep 17, 2019Updated 6 years ago
- Carving tool based in Radare2 & Yara☆16Oct 30, 2018Updated 7 years ago
- An Ansible role that attempts an inplace upgrade of EL7 to EL8 using LEAPP☆15Jun 10, 2020Updated 5 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Apr 18, 2020Updated 5 years ago
- Wireless download of images and videos from Nikon, Canon, and Sony cameras☆11Mar 20, 2024Updated 2 years ago
- Yara matching in ElasticSearch.☆10Jun 12, 2018Updated 7 years ago
- Kibana 6 Templates for Suricata IDPS Threat Hunting☆24Mar 5, 2019Updated 7 years ago
- Indicators of Compromise (IOCs) for malware we have researched☆11Aug 8, 2023Updated 2 years ago
- ☆12Jan 28, 2020Updated 6 years ago
- 一款不需要买代理来减少扫网站目录被封概率的扫描器,适用于中小规格字典。☆19Aug 23, 2021Updated 4 years ago
- Firmware files from Cypress for brcmfmac☆20Jun 26, 2019Updated 6 years ago
- Linux kernel driver for auxiliary displays based on led controllers such as tm16xx family and alike☆16Dec 1, 2025Updated 3 months ago
- Red Hat Certified System Administrator Notes☆19Jul 25, 2020Updated 5 years ago
- study launch anywhere and bundle mismatch bug☆17Apr 23, 2023Updated 2 years ago
- 基于JavaFx编写的C/S图形化界面漏洞验证工具集。☆24Dec 30, 2021Updated 4 years ago
- A Jekyll version of the "Stellar" theme by HTML5 UP.☆14Dec 10, 2022Updated 3 years ago
- DNS Blacklist and Sender Score☆19Apr 19, 2017Updated 8 years ago
- ☆16Jul 28, 2022Updated 3 years ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Nov 27, 2020Updated 5 years ago
- Suricata rules to detect Winnti communication☆16Mar 5, 2018Updated 8 years ago
- ☆12Apr 23, 2020Updated 5 years ago
- YAIDS - Yara-Based IDS - Yara as an Intrusion Detection System / Yet Another Intrusion Detection System - An Intrusion Detection System (…☆26Oct 20, 2022Updated 3 years ago
- Mikrotik's Winbox in a docker container accessible via noVNC through a web browser.☆13May 12, 2025Updated 10 months ago
- Safe wrappers for VFIO☆15Nov 30, 2021Updated 4 years ago
- blkinfo is a python package to list information about all available or the specified block devices.☆11Aug 6, 2023Updated 2 years ago
- DFIR notebooks GCIH Gold project, paper☆12Apr 30, 2015Updated 10 years ago
- A Linux worm targeting vulnerable IoT devices with MMU. Reengineered from/inspired by Mirai botnet.☆18Nov 6, 2022Updated 3 years ago
- ☆23May 12, 2021Updated 4 years ago
- 扫描CobaltStrike的恶意IP☆31Apr 6, 2022Updated 3 years ago
- An Ansible playbook for deploying the Suricata intrusion detection system and fetching Snort rules with Oinkmaster.☆17Oct 30, 2021Updated 4 years ago
- Fast multipattern regular expression searching for digital forensics☆18Jul 31, 2019Updated 6 years ago
- Shell script for encrypted backups with rsync and GnuPG☆32Sep 2, 2022Updated 3 years ago
- 基于pocsuite3框架的poc和exp,持续更新不同漏洞的验证代码。☆24Jan 11, 2023Updated 3 years ago
- Full Packet Capture for the Masses☆14Sep 13, 2018Updated 7 years ago
- A library to automate the conversion of linux-based VMs to a set of docker containers☆14Apr 10, 2015Updated 10 years ago