Configuring the Suricata IDS to detect DoS attacks by adding custom rule file.
☆42May 8, 2020Updated 5 years ago
Alternatives and similar repositories for Suricata-Detect-DoS-Attack
Users that are interested in Suricata-Detect-DoS-Attack are comparing it to the libraries listed below
Sorting:
- Parse Suricata rules☆14Aug 1, 2023Updated 2 years ago
- Quickly generate suricata rules for IOCs☆28Apr 30, 2021Updated 4 years ago
- Repository of creating different example suricata data sets☆37Jan 2, 2019Updated 7 years ago
- Vulnerability Assessment Module - OpenVas with Elastic stack using VulnWhisperer☆19Jun 11, 2019Updated 6 years ago
- Threat Intelligence with Elastic - Minemeld integration with Elasticsearch☆19May 11, 2021Updated 4 years ago
- Check IOC provided by a MISP instance on Suricata events☆18Jun 4, 2019Updated 6 years ago
- This repository contains a few examples of actions that can be added to rules within Elastic Security.☆24Feb 6, 2025Updated last year
- Parse wazuh[HIDS] alerts into ECS mapping using Filebeat☆27Jul 21, 2020Updated 5 years ago
- Monitor Elasticsearch clusters with Grafana dashboards (via Elasticsearch)☆24Mar 10, 2022Updated 3 years ago
- Meer is a "spooler" for Suricata / Sagan.☆30Jun 21, 2023Updated 2 years ago
- ☆38Nov 20, 2025Updated 3 months ago
- Suricata Language Server is an implementation of the Language Server Protocol for Suricata signatures. It adds syntax check, hints and au…☆86Feb 26, 2026Updated last week
- ☆35Dec 9, 2023Updated 2 years ago
- Suricata安装部署&丢包优化&性能调优&规则调整&Pfring设置☆143Oct 14, 2019Updated 6 years ago
- Suricata IDS/IPS log analytics using the Elastic Stack.☆240Jul 28, 2021Updated 4 years ago
- OS Project: Sleeping Teaching Assistant using mutex locks and semaphores.☆10Mar 14, 2020Updated 5 years ago
- ☆11Oct 11, 2020Updated 5 years ago
- ☆10Dec 5, 2017Updated 8 years ago
- Web interface to IntelMQ☆10Sep 10, 2025Updated 5 months ago
- free library for clustering and neuro-fuzzy systems☆10Feb 25, 2026Updated last week
- Collection of Suricata rule sets that I use modified to my environments.☆39Sep 13, 2020Updated 5 years ago
- Suricata rules for network anomaly detection☆183Feb 7, 2026Updated last month
- Ansible playbook for installing MineMeld on Linux☆47Mar 18, 2021Updated 4 years ago
- An implementation of GraphQL in JAVA plus Spark☆11Jan 18, 2016Updated 10 years ago
- ☆10Mar 5, 2018Updated 8 years ago
- 数 据结构——校园导航系统☆10Apr 17, 2015Updated 10 years ago
- Repository for Binary Reverse Engineering exercises.☆12Jul 17, 2020Updated 5 years ago
- Kernel module to hide tcp connections from an attacker ip address☆11Mar 24, 2022Updated 3 years ago
- A vulnerability assessment tool for system models☆13Oct 1, 2021Updated 4 years ago
- 一个简单的音视频处理器,基于FFmpeg与Tauri☆15Jan 17, 2024Updated 2 years ago
- Package lmdb-go provides Go bindings and an idiomatic wrapper for the Symas's LMDB database library.☆10Sep 18, 2016Updated 9 years ago
- Transform EQL detection rules to VQL artifacts☆12Nov 12, 2021Updated 4 years ago
- Automation Framework has many tools commonly used for Network Automation☆10Sep 4, 2025Updated 6 months ago
- ☆15Feb 25, 2026Updated last week
- domain information in JSON format☆10Jun 7, 2017Updated 8 years ago
- Scripts and ideas shared with the community.☆14Feb 27, 2026Updated last week
- An in-memory point-in-polygon (reverse geocoding) package for Who's On First data☆10Sep 28, 2017Updated 8 years ago
- Web Application Firewall Benchmark☆12May 14, 2022Updated 3 years ago
- A collection of Linux Malware Detection projects (research paper implementations) done by me.☆11Jan 6, 2019Updated 7 years ago