Collection of Suricata rule sets that I use modified to my environments.
☆39Sep 13, 2020Updated 5 years ago
Alternatives and similar repositories for Suricata_Threat-Hunting-Rules
Users that are interested in Suricata_Threat-Hunting-Rules are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This TA takes Suricata5 data from your port mirrored Suricata server and makes it readable within Splunk. See Cheatsheets on how to setup…☆15Sep 5, 2020Updated 5 years ago
- Collections of way to evade normal detection events.☆23Sep 13, 2020Updated 5 years ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆21Mar 11, 2021Updated 5 years ago
- Collection of Dashboards for Threat Hunting and more!☆74Oct 17, 2020Updated 5 years ago
- Quickly generate suricata rules for IOCs☆28Apr 30, 2021Updated 4 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆30May 1, 2025Updated 11 months ago
- Suricata rules for network anomaly detection☆182Feb 7, 2026Updated 2 months ago
- Mass Suricata rules creator, from a list of domain☆14Sep 14, 2018Updated 7 years ago
- Repository of creating different example suricata data sets☆36Jan 2, 2019Updated 7 years ago
- Ripple20 Critical Vulnerabilities - Detection Logic and Signatures☆12May 28, 2021Updated 4 years ago
- Configuring the Suricata IDS to detect DoS attacks by adding custom rule file.☆42May 8, 2020Updated 5 years ago
- Memory dump and Sample analysis tool☆19Mar 17, 2025Updated last year
- A few snippets to show how suricata stats can end up in Influx DB using logstash☆12Jul 11, 2016Updated 9 years ago
- Repository with selected IOCs and YARA rules for threat hunting.☆35Apr 8, 2026Updated last week
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆48Nov 11, 2022Updated 3 years ago
- Custom Bootstrap 3 based Webinterface for a Mikrotik Hotspot☆49Oct 11, 2019Updated 6 years ago
- suricata IDS的规则,测试在用的,部分自写的规则视情况放出。☆18Apr 16, 2019Updated 7 years ago
- A flexible, easy to use, automation framework allowing users to integrate their capabilities and devices to cut through the repetitive, t…☆12Nov 23, 2022Updated 3 years ago
- Cyber Threats Detection Rules☆14Sep 16, 2025Updated 7 months ago
- Scirius is a web application for Suricata ruleset management and threat hunting.☆674Dec 23, 2025Updated 3 months ago
- Mapping NSM rules to MITRE ATT&CK☆73Aug 29, 2020Updated 5 years ago
- Suricata rule and intel index☆33Mar 17, 2026Updated last month
- Statistics parsing for suricata☆18Nov 14, 2013Updated 12 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- A curated list of resources to deep dive into the intersection of applied machine learning and threat detection.☆19Sep 23, 2020Updated 5 years ago
- Kibana 6 Templates for Suricata IDPS Threat Hunting☆24Mar 5, 2019Updated 7 years ago
- Threat Detection & Anomaly Detection rules for popular open-source components☆53Jul 27, 2022Updated 3 years ago
- CGNAT em dispositivos baseados em RouterOS☆12May 14, 2019Updated 6 years ago
- Use your Mikrotik firewall to do fail2ban like blocking of unwanted IPs. Written in Go☆27Feb 23, 2026Updated last month
- An Ubuntu 16.04 build containing Suricata, PulledPork, Bro, and Splunk☆23Jul 10, 2018Updated 7 years ago
- ☆38Aug 23, 2022Updated 3 years ago
- Utilizing your Threat data from a MISP instance into CarbonBlack Response by exposing the data in the Threat Intelligence Feed.☆20May 25, 2022Updated 3 years ago
- Sigma detection rules for hunting with the threathunting-keywords project☆59Mar 2, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- fast, extensible, versatile event router for Suricata's EVE-JSON format☆57Mar 19, 2026Updated 3 weeks ago
- Small-scale threat emulation and detection range built on Elastic and Atomic Redteam.☆39Dec 17, 2025Updated 4 months ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Sep 17, 2019Updated 6 years ago
- Yara rules for detecting malware☆23Sep 9, 2025Updated 7 months ago
- The OTX Suricata Rule Generator can be used to create the rules and configuration for Suricata to alert on indicators from your OTX accou…☆117Apr 26, 2024Updated last year
- Workflows for Shuffle☆24Oct 26, 2022Updated 3 years ago
- Suricata rules that can detect a wide range of threats, including malware, exploits, and other malicious activity especially web applicat…☆61Apr 2, 2024Updated 2 years ago