arvindpj007 / Suricata-Detect-DoS-Attack
Configuring the Suricata IDS to detect DoS attacks by adding custom rule file.
☆39Updated 4 years ago
Related projects: ⓘ
- Suricata rules for the new critical vulnerabilities☆79Updated 3 years ago
- zeek-scripts☆40Updated 5 years ago
- Useful resources for Zeek(https://zeek.org/) (Bro(http://bro.org/))☆31Updated 4 years ago
- ☆43Updated last year
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆32Updated 2 years ago
- Quickly generate suricata rules for IOCs☆28Updated 3 years ago
- Mapping NSM rules to MITRE ATT&CK☆68Updated 4 years ago
- This repository will hold PCAP IOC data related with known malware samples (owner: Bryant Smith)☆98Updated 3 years ago
- Download pcap files from http://www.malware-traffic-analysis.net/☆73Updated 6 years ago
- Collection of Suricata rule sets that I use modified to my environments.☆37Updated 4 years ago
- Suricata rules for network anomaly detection☆152Updated 3 weeks ago
- ☆44Updated this week
- This is an open source Snort rules repository☆30Updated 2 years ago
- Collection of various open-source an commercial rulesets for NIDS (especially for Suricata and Snort)☆19Updated last year
- alertflex controller☆10Updated 8 months ago
- A repository for OSSEC rules and decoders☆51Updated last year
- Import Mitre Att&ck into Neo4j database☆32Updated last year
- Suricata Verification Tests - Testing Suricata Output☆99Updated this week
- Snorpy is a python script the gives a Gui interface to help those new to snort create rules.☆60Updated last month
- Open source endpoint agent providing host information to Zeek. [v2]☆61Updated this week
- Suricata rule and intel index☆28Updated last month
- A library and command line tool for extracting indicators of compromise (IOCs) from security reports in PDF, HTML, or text formats☆25Updated this week
- Graph Representation of MITRE ATT&CK's CTI data☆47Updated 4 years ago
- Repository of yara rules☆45Updated 9 years ago
- ☆25Updated this week
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆59Updated 5 months ago
- IoT and Operational Technology Honeypot☆104Updated 11 months ago
- Repository of creating different example suricata data sets☆30Updated 5 years ago
- Explore Indicators of Compromise Automatically☆94Updated 4 years ago
- go-atomicredteam is a Golang application to execute tests as defined in the atomics folder of Red Canary's Atomic Red Team project (https…☆45Updated last year