Cyberg-ON / Timon-RulesLinks
Community-based CybergON-powered Suricata rules
☆12Updated 2 years ago
Alternatives and similar repositories for Timon-Rules
Users that are interested in Timon-Rules are comparing it to the libraries listed below
Sorting:
- A Yara Lua output script for Suricata☆20Updated 6 years ago
- Application and service identification rules for Suricata☆18Updated 2 years ago
- automatic enumeration and maintenance of Suricata monitoring interfaces☆11Updated 5 years ago
- ☆12Updated 5 years ago
- Quickly generate suricata rules for IOCs☆29Updated 4 years ago
- Ripple20 Critical Vulnerabilities - Detection Logic and Signatures☆12Updated 4 years ago
- Carving tool based in Radare2 & Yara☆16Updated 6 years ago
- Application and service identification rules for Suricata☆29Updated 2 years ago
- Simplified go-cat agent for caldera☆10Updated last year
- Various blog post projects.☆10Updated 11 months ago
- alertflex controller☆10Updated 2 months ago
- A repository for OSSEC rules and decoders☆54Updated last year
- Meer is a "spooler" for Suricata / Sagan.☆30Updated last year
- ☆35Updated last year
- This repository will hold PCAP IOC data related with known malware samples (owner: Bryant Smith)☆104Updated 3 years ago
- Mass Suricata rules creator, from a list of domain☆14Updated 6 years ago
- Zeek package for tracking long connections to report them before they have completed.☆30Updated 4 months ago
- Provides a multi-platform Graphical User Interface for hashlookup☆12Updated 10 months ago
- 不定期更新suricata的检测规则☆11Updated 5 years ago
- suricata IDS的规则,测试在用的,部分自写的规则视情况放出。☆18Updated 6 years ago
- Bro analyzer that detects Google's QUIC protocol☆10Updated 4 years ago
- Collect autorun records from running system☆60Updated 3 years ago
- collector/runner☆65Updated 2 months ago
- Generic Signature Format for SIEM Systems☆17Updated last year
- Kibana 6 Templates for Suricata IDPS Threat Hunting☆24Updated 6 years ago
- suricata rules to pcap☆9Updated 4 years ago
- YAIDS - Yara-Based IDS - Yara as an Intrusion Detection System / Yet Another Intrusion Detection System - An Intrusion Detection System (…☆24Updated 2 years ago
- Collection of malware ioc hashes from blog posts. A Python script is provided to search through it.☆17Updated 4 years ago
- Look into EDR events from network☆23Updated last month
- Suricata rules to detect Winnti communication☆14Updated 7 years ago