Collection of Suricata rule sets that I use modified to my environments.
☆39Sep 13, 2020Updated 5 years ago
Alternatives and similar repositories for Suricata_Threat-Hunting-Rules
Users that are interested in Suricata_Threat-Hunting-Rules are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This TA takes Suricata5 data from your port mirrored Suricata server and makes it readable within Splunk. See Cheatsheets on how to setup…☆15Sep 5, 2020Updated 5 years ago
- Cheatsheets and other Yealink Phone information.☆17Apr 13, 2018Updated 7 years ago
- Collection of Dashboards for Threat Hunting and more!☆74Oct 17, 2020Updated 5 years ago
- Suricata rules for the new critical vulnerabilities☆85Jan 26, 2021Updated 5 years ago
- Quickly generate suricata rules for IOCs☆28Apr 30, 2021Updated 4 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆30May 1, 2025Updated 10 months ago
- Suricata rules for network anomaly detection☆183Feb 7, 2026Updated last month
- Mass Suricata rules creator, from a list of domain☆14Sep 14, 2018Updated 7 years ago
- MikroTik Hotspot Monitor V2 [MikroTik API PHP]☆26Sep 2, 2018Updated 7 years ago
- Repository of creating different example suricata data sets☆36Jan 2, 2019Updated 7 years ago
- Ripple20 Critical Vulnerabilities - Detection Logic and Signatures☆12May 28, 2021Updated 4 years ago
- Configuring the Suricata IDS to detect DoS attacks by adding custom rule file.☆42May 8, 2020Updated 5 years ago
- A few snippets to show how suricata stats can end up in Influx DB using logstash☆12Jul 11, 2016Updated 9 years ago
- Repository with selected IOCs and YARA rules for threat hunting.☆35May 21, 2025Updated 10 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆48Nov 11, 2022Updated 3 years ago
- Custom Bootstrap 3 based Webinterface for a Mikrotik Hotspot☆49Oct 11, 2019Updated 6 years ago
- Example Suricata rules implementing some of my detection tactics☆22Jan 13, 2023Updated 3 years ago
- Module to connect Suricata / Barnyard2 to MikroTik for IPS on an eventual alert.☆54Nov 3, 2018Updated 7 years ago
- suricata IDS的规则,测试在用的,部分自写的规则视情况放出。☆18Apr 16, 2019Updated 6 years ago
- A flexible, easy to use, automation framework allowing users to integrate their capabilities and devices to cut through the repetitive, t…☆12Nov 23, 2022Updated 3 years ago
- Cyber Threats Detection Rules☆14Sep 16, 2025Updated 6 months ago
- Scirius is a web application for Suricata ruleset management and threat hunting.☆675Dec 23, 2025Updated 3 months ago
- Mapping NSM rules to MITRE ATT&CK☆73Aug 29, 2020Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Suricata rule and intel index☆33Mar 17, 2026Updated last week
- Statistics parsing for suricata☆18Nov 14, 2013Updated 12 years ago
- A curated list of resources to deep dive into the intersection of applied machine learning and threat detection.☆19Sep 23, 2020Updated 5 years ago
- Kibana 6 Templates for Suricata IDPS Threat Hunting☆24Mar 5, 2019Updated 7 years ago
- Threat Detection & Anomaly Detection rules for popular open-source components☆53Jul 27, 2022Updated 3 years ago
- CGNAT em dispositivos baseados em RouterOS☆12May 14, 2019Updated 6 years ago
- Use your Mikrotik firewall to do fail2ban like blocking of unwanted IPs. Written in Go☆27Feb 23, 2026Updated last month
- An Ubuntu 16.04 build containing Suricata, PulledPork, Bro, and Splunk☆23Jul 10, 2018Updated 7 years ago
- Anomaly Detection using SH-ESD☆10Feb 6, 2019Updated 7 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Utilizing your Threat data from a MISP instance into CarbonBlack Response by exposing the data in the Threat Intelligence Feed.☆20May 25, 2022Updated 3 years ago
- Sigma detection rules for hunting with the threathunting-keywords project☆59Mar 2, 2025Updated last year
- fast, extensible, versatile event router for Suricata's EVE-JSON format☆57Mar 19, 2026Updated last week
- Small-scale threat emulation and detection range built on Elastic and Atomic Redteam.☆39Dec 17, 2025Updated 3 months ago
- Yara rules for detecting malware☆23Sep 9, 2025Updated 6 months ago
- The OTX Suricata Rule Generator can be used to create the rules and configuration for Suricata to alert on indicators from your OTX accou…☆116Apr 26, 2024Updated last year
- Workflows for Shuffle☆24Oct 26, 2022Updated 3 years ago