PiRogueToolSuite / suricata-rules
Suricata rules used by the PiRogue
☆9Updated 10 months ago
Alternatives and similar repositories for suricata-rules:
Users that are interested in suricata-rules are comparing it to the libraries listed below
- Pattern recognition for hosts, services, and content☆13Updated 2 years ago
- Useful commands for infosec☆29Updated 2 years ago
- Network Defender Toolkit☆18Updated 11 years ago
- ☆26Updated 6 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- Parallel ssdeep clustering kit☆20Updated 7 years ago
- Forensics triage tool relying on Volatility and Foremost☆26Updated last year
- The Multiplatform Linux Sandbox☆15Updated last year
- Passive DNS server interface compliant to "Common Output Format"☆10Updated 8 years ago
- CERTITUDE - A python package to classify malicious URLs☆20Updated 2 years ago
- It's like DocBleach, but in your browser☆18Updated 5 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆38Updated 2 months ago
- DFF (Digital Forensics Framework)☆10Updated 4 years ago
- ☆16Updated 8 years ago
- Honeybrid is a network application built to 1) administrate network of honeypots, and 2) transparently redirect live network sessions (TC…☆31Updated 6 years ago
- Malice Office/OLE/RTF Plugin☆13Updated 6 years ago
- Notebook collection☆10Updated 6 years ago
- Polyglot detector☆21Updated last year
- A mapping project between tags (annotations, labels) and domain names☆11Updated last year
- sslxray is an SSL/TLS scanning tool designed to detect a wide range of issues☆27Updated 6 years ago
- Scapy hands-on☆34Updated last year
- We publish indicators of compromise related to our stories here. See https://blog.team-cymru.com/ for more information.☆9Updated 3 years ago
- Help fuzz various protocols and waits for ping backs Integrates LDAP server and JNDI payload☆11Updated 3 years ago
- CSIRT Tooling: Best Practices in Developing, Maintaining and Distributing Open Source Tools☆16Updated 2 years ago
- upstream for seccheck☆15Updated 6 years ago
- Various fuzzers written in Python. Currently has a TCP server for fuzzing client software, and a CLI fuzzer to use against programs ran f…☆10Updated 7 years ago
- Proof-of-Concept Dictionary Attacker against IKEv1 PSK in Main Mode☆18Updated 5 years ago
- Ccollection of Linux loadable kernel modules aimed to logs any user action☆25Updated 6 years ago
- Main repository to pull all Cisco related projects.☆15Updated 7 years ago
- ssdeep cluster analysis for malware files☆30Updated 4 years ago