JJyyy / suricata-rules
不定期更新suricata的检测规则
☆11Updated 4 years ago
Alternatives and similar repositories for suricata-rules:
Users that are interested in suricata-rules are comparing it to the libraries listed below
- Red Team Tools for Emulated Adversary Techniques with MITRE ATT&CK☆30Updated 4 years ago
- Articles accumulated by the 360Quake team.☆16Updated 3 years ago
- A simple script for quickly mining sensitive information in binary files.☆29Updated 4 years ago
- CVE-2020-10204 远程命令执行脚本☆13Updated 4 years ago
- ATT&CK技战术数据☆15Updated 3 years ago
- Show AV Processes list☆14Updated 4 years ago
- YaraSploit is a collection of Yara rules generated from Metasploit framework shellcodes.☆43Updated last year
- Dependencies with Log4j2 Checklist☆35Updated 3 years ago
- ☆13Updated 4 years ago
- HTTP Protocol Stack CVE-2021-31166☆13Updated 3 months ago
- ☆21Updated 4 years ago
- SRCHunter一款基于python的开源扫描器☆10Updated 6 years ago
- sudo heap overflow to LPE, in Go☆16Updated 3 years ago
- CVE-2020-0796-Scanner☆9Updated 4 years ago
- ☆15Updated 4 years ago
- It is a repository for Red Team emulation based on MITRE ATT&CK.☆16Updated 5 years ago
- A simple xss bot template☆23Updated 4 years ago
- TrojanDropper/PS.Maloader.d☆12Updated 3 years ago
- CVE-2020-10199 回显版本☆31Updated 6 months ago
- Read Navicat 12 Password☆19Updated 4 years ago
- Jsp Decoder Source Code☆16Updated 3 years ago
- ☆13Updated last year
- CVE-2021-21975 vRealize Operations Manager SSRF☆13Updated 3 years ago
- SUNBURST DGA decoder☆11Updated 4 years ago
- ☆25Updated 4 years ago