PiRogueToolSuite / suricata-rules
Suricata rules used by the PiRogue
☆9Updated 10 months ago
Alternatives and similar repositories for suricata-rules
Users that are interested in suricata-rules are comparing it to the libraries listed below
Sorting:
- Passive DNS server interface compliant to "Common Output Format"☆10Updated 8 years ago
- ☆26Updated 6 years ago
- A multi-purpose, modular medium-interaction honeypot based on Twisted.☆19Updated 3 years ago
- Prototype system to monitor BGP routes and alert when anomalies are identified☆15Updated 6 years ago
- 5 cves of ntp 4.2.8p15 founded by me.☆12Updated 2 years ago
- Golang based web service to scan files with yara rules☆26Updated 7 years ago
- Network Defender Toolkit☆18Updated 11 years ago
- server for indexing and querying passive DNS observations☆46Updated 2 months ago
- ☆16Updated 8 years ago
- The FastIR Server is a Web server to schedule FastIR Collector forensics collect thanks to the FastIR Agent☆12Updated 8 years ago
- CSIRT Tooling: Best Practices in Developing, Maintaining and Distributing Open Source Tools☆16Updated 2 years ago
- CERTITUDE - A python package to classify malicious URLs☆20Updated 3 years ago
- Useful commands for infosec☆29Updated 2 years ago
- Full Packet Capture for the Masses☆14Updated 6 years ago
- FastIR Agent is a Windows service to execute FastIR Collector on demand☆14Updated 8 years ago
- ☆24Updated 2 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 4 years ago
- Set of tools and documentation for leveraging private APNs for mobile network traffic analysis☆24Updated 8 months ago
- A mapping project between tags (annotations, labels) and domain names☆11Updated last year
- A Passive DNS backend and collector☆31Updated 2 years ago
- Various fuzzers written in Python. Currently has a TCP server for fuzzing client software, and a CLI fuzzer to use against programs ran f…☆10Updated 7 years ago
- Technical Notes☆16Updated 7 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- ☆14Updated 6 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated 7 months ago
- Network Tools☆32Updated last year
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆38Updated 3 months ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- My attempt at writing exploit POCs for various CVEs☆16Updated 5 years ago
- ☆28Updated this week