Snort Rules
☆19Mar 9, 2016Updated 10 years ago
Alternatives and similar repositories for snort
Users that are interested in snort are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Quickly generate snort rules for IOCs☆18Oct 21, 2015Updated 10 years ago
- Virustotal Lookup filter for Logstash☆16May 11, 2017Updated 8 years ago
- AYY LMAO☆22Mar 26, 2016Updated 10 years ago
- AYY LMAO☆12Aug 27, 2015Updated 10 years ago
- Network Scout (NS) is an extension to Artillery. NS allows you to access log files from multiple clients.☆21May 2, 2016Updated 10 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Just another tool to extract Indicator of compromise (ioc) from files☆29Oct 1, 2015Updated 10 years ago
- Based on the Volatility framework, this script will run various plugins as well as create a timeline, or use YARA/ClamAV/VirusTotal to fi…☆49May 31, 2017Updated 8 years ago
- Snort rules to detect local malware, phishing, and adult content by inspecting DNS responses from OpenDNS☆51Sep 16, 2016Updated 9 years ago
- Ponmocup Indicators of Compromise☆10Feb 4, 2016Updated 10 years ago
- Use DNS to hunt for threats including DGAs☆15Jan 4, 2016Updated 10 years ago
- ☆25Aug 25, 2015Updated 10 years ago
- Snort in a Docker Container☆31Mar 21, 2014Updated 12 years ago
- Library and tools to access the Windows Hibernation File (hiberfil.sys) format☆13Dec 20, 2025Updated 4 months ago
- (Unofficial) Python API for https://sslbl.abuse.ch/☆11Dec 9, 2016Updated 9 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆11Aug 22, 2017Updated 8 years ago
- Social Engineering for the Blue Team☆11Feb 1, 2024Updated 2 years ago
- The Grum Spam Bot☆20Feb 25, 2015Updated 11 years ago
- PHP Phishing Framework☆28Dec 28, 2013Updated 12 years ago
- ☆15Mar 18, 2017Updated 9 years ago
- Metadata Inspection Database Alerting System☆42Jul 26, 2013Updated 12 years ago
- Tools for NTDS.dit☆17Apr 26, 2018Updated 8 years ago
- Monitor your domains for newly issued certificates and alert to Slack in near-realtime☆10Aug 29, 2022Updated 3 years ago
- Python command-line tool that uses nearest neighbor search methods for malware similarity analysis☆16Jan 29, 2019Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Ruby Oracle Security Scanner☆16Jul 9, 2012Updated 13 years ago
- Snort rules☆35Nov 20, 2018Updated 7 years ago
- Extracts Windows user info including the password hashes☆40Jul 26, 2016Updated 9 years ago
- This sample app is a .NET/Winform tool to test making REST calls for Outlook/Exchange data, using either the Microsoft Graph SDK (client …☆19Nov 17, 2025Updated 5 months ago
- Scripts to integrate N-Central with ScreenConnect☆12Feb 13, 2020Updated 6 years ago
- ☆10Dec 28, 2015Updated 10 years ago
- Identify vulnerabilities in your API's using the OpenAPI Security Scanner☆12Dec 6, 2018Updated 7 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆12Aug 2, 2013Updated 12 years ago
- Snort_rules detection bad actors.☆29Aug 18, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- netbeacon - monitoring your network capture, NIDS or network analysis process☆20Apr 5, 2026Updated last month
- This script is used as a supplement to vulnerability assessment tools such as Nessus, Retina, and various other scanners that are used in…☆19Dec 1, 2017Updated 8 years ago
- ☆13Apr 16, 2016Updated 10 years ago
- Indicator of Compromise Mapping Service☆12Apr 15, 2014Updated 12 years ago
- Observable Network Appliance for passive monitoring of a network☆17May 8, 2025Updated 11 months ago
- Some yara rules and tools☆16Feb 12, 2014Updated 12 years ago
- A tool to generate Snort rules based on public IP reputation data☆56Aug 28, 2013Updated 12 years ago