LeeBrotherston / snortView external linksLinks
Snort Rules
☆19Mar 9, 2016Updated 9 years ago
Alternatives and similar repositories for snort
Users that are interested in snort are comparing it to the libraries listed below
Sorting:
- Quickly generate snort rules for IOCs☆18Oct 21, 2015Updated 10 years ago
- AYY LMAO☆22Mar 26, 2016Updated 9 years ago
- AYY LMAO☆12Aug 27, 2015Updated 10 years ago
- Network Scout (NS) is an extension to Artillery. NS allows you to access log files from multiple clients.☆21May 2, 2016Updated 9 years ago
- Just another tool to extract Indicator of compromise (ioc) from files☆29Oct 1, 2015Updated 10 years ago
- ThreatTracker is a Python script designed to monitor and generate alerts on given sets of indicators of compromise (IOCs) indexed by a se…☆69Mar 9, 2015Updated 10 years ago
- PHP Phishing Framework☆28Dec 28, 2013Updated 12 years ago
- IRC bot framework written in Python.☆30Mar 20, 2021Updated 4 years ago
- The Grum Spam Bot☆20Feb 25, 2015Updated 10 years ago
- Snort rules to detect local malware, phishing, and adult content by inspecting DNS responses from OpenDNS☆52Sep 16, 2016Updated 9 years ago
- A set of templates for documenting threat intelligence☆75Feb 28, 2013Updated 12 years ago
- Metadata Inspection Database Alerting System☆42Jul 26, 2013Updated 12 years ago
- ☆19Jul 24, 2021Updated 4 years ago
- TIH is an intelligence tool that helps you in searching for IOCs across multiple openly available security feeds and some well known APIs…☆157Jun 13, 2025Updated 8 months ago
- Cyber Intel Management☆51Jan 25, 2018Updated 8 years ago
- Snort_rules detection bad actors.☆29Aug 18, 2024Updated last year
- Bringing DevOps to Forensics☆34Feb 4, 2015Updated 11 years ago
- This is a malware analysis project which expecte to generate snort rule via malicious network traffic☆28Apr 13, 2023Updated 2 years ago
- Snort in a Docker Container☆31Mar 21, 2014Updated 11 years ago
- A Python script that generates Snort IDS rules from network packets☆25Oct 30, 2017Updated 8 years ago
- ARCHIVED ce1sus, a threat information database ARCHIVED☆28Dec 8, 2015Updated 10 years ago
- Security information and event management, masters's diploma☆10Aug 3, 2015Updated 10 years ago
- CRITs IOC Visualization in Maltego☆28Jan 8, 2015Updated 11 years ago
- Coalfire GCP RAMP/pak Reference Architecture☆13Feb 5, 2026Updated last week
- Snort rules☆35Nov 20, 2018Updated 7 years ago
- Threat Intelligence distribution☆31Dec 30, 2015Updated 10 years ago
- Scripts that are suited for blue teams☆33Mar 17, 2016Updated 9 years ago
- Extracts Windows user info including the password hashes☆41Jul 26, 2016Updated 9 years ago
- Malformity is a Maltego project based on the Canari framework for malicious binary and infrastructure research.☆115May 4, 2016Updated 9 years ago
- Hyper-parallel ZK coprocessing.☆17Aug 29, 2025Updated 5 months ago
- Build a project with Express.js☆11Jan 31, 2021Updated 5 years ago
- NIST transition-edge sensor (TES) data acquisition framework☆14Feb 2, 2026Updated last week
- Ghi chép về snort, suricata, SIEM, OSSEC ...☆11Dec 4, 2018Updated 7 years ago
- Azure Deployment Templates for Mandiant Managed Huning☆12Jun 1, 2023Updated 2 years ago
- The C-Agent is a reference implementation of a Keyfactor Orchestrator geared toward use in IoT based solutions.☆12Aug 28, 2025Updated 5 months ago
- ☆13Aug 28, 2025Updated 5 months ago
- Calendari elettronici per la raccolta rifiuti di Chieri e comuni limitrofi☆12Dec 23, 2025Updated last month
- netbeacon - monitoring your network capture, NIDS or network analysis process☆19Oct 26, 2013Updated 12 years ago
- ☆12Jun 1, 2024Updated last year