Snort Rules
☆19Mar 9, 2016Updated 9 years ago
Alternatives and similar repositories for snort
Users that are interested in snort are comparing it to the libraries listed below
Sorting:
- Quickly generate snort rules for IOCs☆18Oct 21, 2015Updated 10 years ago
- AYY LMAO☆22Mar 26, 2016Updated 9 years ago
- AYY LMAO☆12Aug 27, 2015Updated 10 years ago
- Just another tool to extract Indicator of compromise (ioc) from files☆29Oct 1, 2015Updated 10 years ago
- Based on the Volatility framework, this script will run various plugins as well as create a timeline, or use YARA/ClamAV/VirusTotal to fi…☆49May 31, 2017Updated 8 years ago
- ThreatTracker is a Python script designed to monitor and generate alerts on given sets of indicators of compromise (IOCs) indexed by a se…☆70Mar 9, 2015Updated 10 years ago
- PHP Phishing Framework☆28Dec 28, 2013Updated 12 years ago
- The Grum Spam Bot☆20Feb 25, 2015Updated 11 years ago
- Snort rules to detect local malware, phishing, and adult content by inspecting DNS responses from OpenDNS☆52Sep 16, 2016Updated 9 years ago
- A set of templates for documenting threat intelligence☆75Feb 28, 2013Updated 13 years ago
- ☆19Jul 24, 2021Updated 4 years ago
- Suppress list for snort in pfsense☆21Apr 7, 2016Updated 9 years ago
- Metadata Inspection Database Alerting System☆42Jul 26, 2013Updated 12 years ago
- TIH is an intelligence tool that helps you in searching for IOCs across multiple openly available security feeds and some well known APIs…☆157Jun 13, 2025Updated 8 months ago
- Cyber Intel Management☆51Jan 25, 2018Updated 8 years ago
- This is a malware analysis project which expecte to generate snort rule via malicious network traffic☆28Apr 13, 2023Updated 2 years ago
- Bringing DevOps to Forensics☆34Feb 4, 2015Updated 11 years ago
- Snort_rules detection bad actors.☆29Aug 18, 2024Updated last year
- Snort in a Docker Container☆31Mar 21, 2014Updated 11 years ago
- A Python script that generates Snort IDS rules from network packets☆24Oct 30, 2017Updated 8 years ago
- ARCHIVED ce1sus, a threat information database ARCHIVED☆28Dec 8, 2015Updated 10 years ago
- Miscellaneous analysis tools☆25Mar 3, 2015Updated 11 years ago
- Digital Forensics and Incident Response Wiki☆40May 19, 2014Updated 11 years ago
- CRITs IOC Visualization in Maltego☆28Jan 8, 2015Updated 11 years ago
- Coalfire GCP RAMP/pak Reference Architecture☆13Feb 5, 2026Updated last month
- open-source intelligence gathering for SIEMs <3☆37Feb 16, 2017Updated 9 years ago
- Threat Intelligence distribution☆31Dec 30, 2015Updated 10 years ago
- Random number rootkit for the Linux kernel☆28Mar 15, 2016Updated 9 years ago
- Scripts that are suited for blue teams☆33Mar 17, 2016Updated 9 years ago
- Extracts Windows user info including the password hashes☆40Jul 26, 2016Updated 9 years ago
- Malformity is a Maltego project based on the Canari framework for malicious binary and infrastructure research.☆115May 4, 2016Updated 9 years ago
- Ghi chép về snort, suricata, SIEM, OSSEC ...☆11Dec 4, 2018Updated 7 years ago
- Hyper-parallel ZK coprocessing.☆17Aug 29, 2025Updated 6 months ago
- The C-Agent is a reference implementation of a Keyfactor Orchestrator geared toward use in IoT based solutions.☆12Aug 28, 2025Updated 6 months ago
- NIST transition-edge sensor (TES) data acquisition framework☆16Feb 24, 2026Updated last week
- ☆13Aug 28, 2025Updated 6 months ago
- Build a project with Express.js☆11Jan 31, 2021Updated 5 years ago
- This is a templated to be used for QRL Jacking Sessions (Tested on Chrome,brave & firefox )☆13Feb 26, 2022Updated 4 years ago
- Azure Deployment Templates for Mandiant Managed Huning☆12Jun 1, 2023Updated 2 years ago