Cyberg-ON / Timon-Rules
Community-based CybergON-powered Suricata rules
☆12Updated 2 years ago
Alternatives and similar repositories for Timon-Rules:
Users that are interested in Timon-Rules are comparing it to the libraries listed below
- A Yara Lua output script for Suricata☆19Updated 6 years ago
- Application and service identification rules for Suricata☆18Updated 2 years ago
- automatic enumeration and maintenance of Suricata monitoring interfaces☆11Updated 5 years ago
- Golang based web service to scan files with yara rules☆27Updated 7 years ago
- Python framework for manipulating bulk WHOIS data from RIRs☆21Updated 3 years ago
- Carving tool based in Radare2 & Yara☆16Updated 6 years ago
- Quickly generate suricata rules for IOCs☆29Updated 3 years ago
- Prototype system to monitor BGP routes and alert when anomalies are identified☆15Updated 6 years ago
- Repository to provide files related to our blog articles.☆16Updated last year
- Various blog post projects.☆10Updated 10 months ago
- Meer is a "spooler" for Suricata / Sagan.☆29Updated last year
- Ripple20 Critical Vulnerabilities - Detection Logic and Signatures☆12Updated 3 years ago
- Collect autorun records from running system☆61Updated 3 years ago
- Look into EDR events from network☆23Updated last year
- Suricata rules to detect Winnti communication☆14Updated 7 years ago
- ☆22Updated 5 years ago
- This repository will hold PCAP IOC data related with known malware samples (owner: Bryant Smith)☆101Updated 3 years ago
- This is an open source Snort rules repository☆30Updated 2 years ago
- Network timing evaluation used to detect beacons, works with argus flow as the source☆20Updated 8 years ago
- Basic RDP honeypot script☆32Updated 2 years ago
- Useful resources for Zeek(https://zeek.org/) (Bro(http://bro.org/))☆31Updated 5 years ago
- Suricata rule and intel index☆30Updated 3 weeks ago
- Configuring the Suricata IDS to detect DoS attacks by adding custom rule file.☆39Updated 4 years ago
- Advanced Persistent Threat Detection Using Network Analysis☆22Updated 6 years ago
- 不定期更新suricata的检测规则☆11Updated 5 years ago
- Porting Suricata to Bro signatures☆6Updated 5 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 4 years ago
- Threat Mapping Catalogue☆17Updated 3 years ago
- simple python socket connection to test if exim is vulnerable to CVE-2019-10149. The payload simply touch a file in /tmp/eximrce.☆13Updated 5 years ago
- Meer (GPLv2) is a dedicated "spooler" for the Suricata & Sagan EVE output formats.☆23Updated 4 years ago