Phillipmartin / snortsigView external linksLinks
☆10Dec 28, 2015Updated 10 years ago
Alternatives and similar repositories for snortsig
Users that are interested in snortsig are comparing it to the libraries listed below
Sorting:
- Yara rules☆10Dec 10, 2019Updated 6 years ago
- Yara rules I've written☆10Dec 9, 2015Updated 10 years ago
- ☆17Mar 22, 2018Updated 7 years ago
- Sighting DB is designed to scale writing and reading a count of attributes, tracking when if was first and last seen☆17Apr 11, 2024Updated last year
- Detect HTTP stalling attacks like slowloris with Bro☆19Mar 1, 2018Updated 7 years ago
- List of scripts used for malware analysis☆15Aug 10, 2015Updated 10 years ago
- Useful scripts, rules etc. for use with YARA☆27Feb 12, 2021Updated 5 years ago
- The high-level/low-level implementation of Linux Fanotify.☆23Nov 11, 2025Updated 3 months ago
- Unfetter Insight performs natural language processing and analysis for text data to determine and convert to CTI Stix data automatically.☆20Sep 4, 2018Updated 7 years ago
- Rust implementation of the DCSO Bloom filter☆29Jul 15, 2025Updated 7 months ago
- Python API wrapper for the Joe Sandbox API.☆68Jan 19, 2026Updated 3 weeks ago
- Automation for VirusTotal☆31May 6, 2016Updated 9 years ago
- integrating bro into yara☆33Dec 9, 2014Updated 11 years ago
- KLEE-fl : Compile Project to Bitcode and Try Fuzzing with KLEE .☆30Apr 7, 2019Updated 6 years ago
- ☆75Feb 17, 2022Updated 3 years ago
- intelligence-icons is a collection of icons and diagrams for building training and marketing materials around Intelligence sharing; inclu…☆41Mar 17, 2019Updated 6 years ago
- Debpic lets you easily build Debian packages in an isolated Docker environment.☆11Dec 6, 2024Updated last year
- A tool designed for consistent and safe capture of off network web resources.☆39Mar 24, 2017Updated 8 years ago
- Automatically download youtube channels and programming from public German TV stations☆16Aug 2, 2022Updated 3 years ago
- QRadar AQL backend for converting Sigma rules to QRadar AQL queries☆14Sep 18, 2025Updated 4 months ago
- Universal Forensic Indexer and Analyzer☆10Jan 8, 2017Updated 9 years ago
- In this training will be covered about a very basic step for malware analysis. Using several free tools to recognize malware behavior. Si…☆12May 25, 2016Updated 9 years ago
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Jan 30, 2024Updated 2 years ago
- ☆12Jul 15, 2016Updated 9 years ago
- Static Feature Extraction & Selection (used in conjunction with the MASTIFF framework)☆16Oct 19, 2016Updated 9 years ago
- An effective share hashmap based on dpdk☆13May 30, 2016Updated 9 years ago
- Mock STIX data demonstrating the new data source representation☆16Sep 13, 2023Updated 2 years ago
- ☆12May 30, 2019Updated 6 years ago
- ☆11Nov 26, 2025Updated 2 months ago
- User-friendly C Library to perform TCP streams reassembly and IPv4/6 defragmentation☆107Apr 20, 2018Updated 7 years ago
- Term List Matching Plugin for ElasticSearch☆26Jan 20, 2014Updated 12 years ago
- Indicator of Compromise Mapping Service☆12Apr 15, 2014Updated 11 years ago
- Universal Linux LKM rootkit, designed to work in any kernel version and both architectures (i686 and x86_64).☆50Jan 15, 2024Updated 2 years ago
- Passive DNS server interface compliant to "Common Output Format"☆10Sep 19, 2016Updated 9 years ago
- JSON-based DSLs are not for humans..☆10Sep 4, 2014Updated 11 years ago
- snake-core - the real snake☆15Jul 11, 2023Updated 2 years ago
- Modified chesterish Jupyter theme with larger font and Iosevka webfont☆10Nov 25, 2017Updated 8 years ago
- Quantum Insert Backdoor POC☆11May 21, 2017Updated 8 years ago
- Custom rules for yara-integrated scans☆16Jun 5, 2013Updated 12 years ago