arvindpj007 / Suricata-Detect-DoS-AttackView external linksLinks
Configuring the Suricata IDS to detect DoS attacks by adding custom rule file.
☆42May 8, 2020Updated 5 years ago
Alternatives and similar repositories for Suricata-Detect-DoS-Attack
Users that are interested in Suricata-Detect-DoS-Attack are comparing it to the libraries listed below
Sorting:
- Parse Suricata rules☆13Aug 1, 2023Updated 2 years ago
- Quickly generate suricata rules for IOCs☆28Apr 30, 2021Updated 4 years ago
- Repository of creating different example suricata data sets☆37Jan 2, 2019Updated 7 years ago
- Suricata LUA scripts to detect CVE-2019-12255, CVE-2019-12256, CVE-2019-12258, and CVE-2019-12260☆19Nov 28, 2019Updated 6 years ago
- Threat Intelligence with Elastic - Minemeld integration with Elasticsearch☆19May 11, 2021Updated 4 years ago
- Check IOC provided by a MISP instance on Suricata events☆18Jun 4, 2019Updated 6 years ago
- This repository contains a few examples of actions that can be added to rules within Elastic Security.☆24Feb 6, 2025Updated last year
- Parse wazuh[HIDS] alerts into ECS mapping using Filebeat☆28Jul 21, 2020Updated 5 years ago
- Monitor Elasticsearch clusters with Grafana dashboards (via Elasticsearch)☆24Mar 10, 2022Updated 3 years ago
- Meer is a "spooler" for Suricata / Sagan.☆30Jun 21, 2023Updated 2 years ago
- The "Let's-defend-solution" directory contains the answers to all paths of the Let's Defend platform that were saved by the creator 8 mon…☆12Apr 27, 2023Updated 2 years ago
- ☆38Nov 20, 2025Updated 2 months ago
- Mitre ATT&CK and Suricata Rules Automation with AI & LLM☆14Sep 28, 2024Updated last year
- Suricata IDS/IPS log analytics using the Elastic Stack.☆241Jul 28, 2021Updated 4 years ago
- Web interface to IntelMQ☆10Sep 10, 2025Updated 5 months ago
- golang package to provide lightweight internal pub/sub for goroutines☆29Jan 23, 2014Updated 12 years ago
- ☆10Dec 5, 2017Updated 8 years ago
- Collection of Suricata rule sets that I use modified to my environments.☆39Sep 13, 2020Updated 5 years ago
- 京东评论,情感分析,LDA,决策树,评论爬取,Python,emotional analysis of e-commerce comments☆13May 14, 2023Updated 2 years ago
- Suricata rules for network anomaly detection☆184Feb 7, 2026Updated last week
- Ansible playbook for installing MineMeld on Linux☆48Mar 18, 2021Updated 4 years ago
- 将pdf分成彩色和黑白部分,便于打印☆11Mar 9, 2025Updated 11 months ago
- A pure-Python DNS server for local development.☆10Apr 23, 2018Updated 7 years ago
- 🧬 Simple API key validation middleware for Fiber☆10Nov 23, 2020Updated 5 years ago
- Mainflux Licensing Server☆14Apr 3, 2020Updated 5 years ago
- The hub for all JATS4R meeting notes, examples, draft recommendations, documents, and issues.☆17Sep 8, 2019Updated 6 years ago
- Repository for Binary Reverse Engineering exercises.☆12Jul 17, 2020Updated 5 years ago
- ☆10Mar 5, 2018Updated 7 years ago
- Web Application Firewall Benchmark☆12May 14, 2022Updated 3 years ago
- NTOP nDPI Library example usage and FFI bindings for Lua, NodeJS☆13Jan 29, 2018Updated 8 years ago
- jQuery-based Json to html pretty printer☆26Jun 15, 2012Updated 13 years ago
- VulnWhisperer Stack (ELK + VulnWhisperer + OpenVAS + Nessus)☆13Aug 14, 2018Updated 7 years ago
- this is a small script for extracting questions from try hack me room ,and creating a MD file☆12Mar 6, 2023Updated 2 years ago
- ☆23Jun 22, 2017Updated 8 years ago
- ☆11Jul 14, 2017Updated 8 years ago
- 数据结构——校园导航系统☆10Apr 17, 2015Updated 10 years ago
- Collection of malware ioc hashes from blog posts. A Python script is provided to search through it.☆19Sep 10, 2020Updated 5 years ago
- Python Library for ConfigExtractor☆14Feb 4, 2026Updated last week
- 思科vpn客户端☆12Nov 24, 2016Updated 9 years ago