Snort Rules
☆19Mar 9, 2016Updated 10 years ago
Alternatives and similar repositories for snort
Users that are interested in snort are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Quickly generate snort rules for IOCs☆18Oct 21, 2015Updated 10 years ago
- Virustotal Lookup filter for Logstash☆16May 11, 2017Updated 8 years ago
- AYY LMAO☆22Mar 26, 2016Updated 10 years ago
- Network Scout (NS) is an extension to Artillery. NS allows you to access log files from multiple clients.☆21May 2, 2016Updated 9 years ago
- Just another tool to extract Indicator of compromise (ioc) from files☆29Oct 1, 2015Updated 10 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Based on the Volatility framework, this script will run various plugins as well as create a timeline, or use YARA/ClamAV/VirusTotal to fi…☆49May 31, 2017Updated 8 years ago
- Snort rules to detect local malware, phishing, and adult content by inspecting DNS responses from OpenDNS☆52Sep 16, 2016Updated 9 years ago
- A Python script that generates Snort IDS rules from network packets☆24Oct 30, 2017Updated 8 years ago
- Ponmocup Indicators of Compromise☆11Feb 4, 2016Updated 10 years ago
- Use DNS to hunt for threats including DGAs☆15Jan 4, 2016Updated 10 years ago
- ThreatTracker is a Python script designed to monitor and generate alerts on given sets of indicators of compromise (IOCs) indexed by a se…☆70Mar 9, 2015Updated 11 years ago
- ☆24Aug 25, 2015Updated 10 years ago
- Snort in a Docker Container☆31Mar 21, 2014Updated 12 years ago
- Library and tools to access the Windows Hibernation File (hiberfil.sys) format☆13Dec 20, 2025Updated 3 months ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- (Unofficial) Python API for https://sslbl.abuse.ch/☆11Dec 9, 2016Updated 9 years ago
- ☆12Aug 22, 2017Updated 8 years ago
- PHP Phishing Framework☆28Dec 28, 2013Updated 12 years ago
- The Grum Spam Bot☆20Feb 25, 2015Updated 11 years ago
- ☆15Mar 18, 2017Updated 9 years ago
- Metadata Inspection Database Alerting System☆42Jul 26, 2013Updated 12 years ago
- Tools for NTDS.dit☆17Apr 26, 2018Updated 7 years ago
- A set of templates for documenting threat intelligence☆75Feb 28, 2013Updated 13 years ago
- Python command-line tool that uses nearest neighbor search methods for malware similarity analysis☆16Jan 29, 2019Updated 7 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Ruby Oracle Security Scanner☆16Jul 9, 2012Updated 13 years ago
- Extracts Windows user info including the password hashes☆40Jul 26, 2016Updated 9 years ago
- Snort rules☆35Nov 20, 2018Updated 7 years ago
- This sample app is a .NET/Winform tool to test making REST calls for Outlook/Exchange data, using either the Microsoft Graph SDK (client …☆19Nov 17, 2025Updated 4 months ago
- ☆10Dec 28, 2015Updated 10 years ago
- Scripts to integrate N-Central with ScreenConnect☆12Feb 13, 2020Updated 6 years ago
- Identify vulnerabilities in your API's using the OpenAPI Security Scanner☆12Dec 6, 2018Updated 7 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆12Aug 2, 2013Updated 12 years ago
- netbeacon - monitoring your network capture, NIDS or network analysis process☆19Oct 26, 2013Updated 12 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Snort_rules detection bad actors.☆29Aug 18, 2024Updated last year
- A PHP feature testing library inspired by GitHub's Scientist☆12Jan 27, 2016Updated 10 years ago
- This script is used as a supplement to vulnerability assessment tools such as Nessus, Retina, and various other scanners that are used in…☆19Dec 1, 2017Updated 8 years ago
- ☆13Apr 16, 2016Updated 9 years ago
- Indicator of Compromise Mapping Service☆12Apr 15, 2014Updated 11 years ago
- Some yara rules and tools☆16Feb 12, 2014Updated 12 years ago
- A tool to generate Snort rules based on public IP reputation data☆56Aug 28, 2013Updated 12 years ago