bhdresh / SnortRulesLinks
This is an open source Snort rules repository
☆30Updated 3 years ago
Alternatives and similar repositories for SnortRules
Users that are interested in SnortRules are comparing it to the libraries listed below
Sorting:
- This repository will hold PCAP IOC data related with known malware samples (owner: Bryant Smith)☆105Updated 4 years ago
- Suricata rules for the new critical vulnerabilities☆83Updated 4 years ago
- Download pcap files from http://www.malware-traffic-analysis.net/☆79Updated 7 years ago
- Suricata rules for network anomaly detection☆167Updated 3 months ago
- IoT and Operational Technology Honeypot☆103Updated last year
- Collection of various open-source an commercial rulesets for NIDS (especially for Suricata and Snort)☆27Updated 2 years ago
- PcapMonkey will provide an easy way to analyze pcap using the latest version of Suricata and Zeek.☆156Updated 4 months ago
- ☆55Updated last year
- ☆43Updated 2 years ago
- Collection of Suricata rule sets that I use modified to my environments.☆39Updated 4 years ago
- zeek-scripts☆44Updated 6 years ago
- ☆33Updated 6 years ago
- High Interaction Honeypot Solution for Redis protocol☆24Updated 4 years ago
- Awesome Honeypot Resource Collection. Including 250+ Honeypot tools, and 350+ posts about Honeypot.☆91Updated 5 years ago
- Tools to interact with APTnotes reporting/index.☆103Updated 4 years ago
- Convert pcap files into richly-typed ZNG summary logs (Zeek, Suricata, and more)☆83Updated 3 months ago
- Explore Indicators of Compromise Automatically☆95Updated 5 years ago
- An easy ATT&CK-based Sysmon hunting tool, showing in Blackhat USA 2019 Arsenal☆202Updated 3 years ago
- Suspicious DGA from PDNS and Sandbox.☆186Updated 3 years ago
- Botnet Simulation Framework☆77Updated 5 years ago
- Suricata Verification Tests - Testing Suricata Output☆112Updated this week
- Mapping NSM rules to MITRE ATT&CK☆71Updated 4 years ago
- Configuring the Suricata IDS to detect DoS attacks by adding custom rule file.☆39Updated 5 years ago
- This tool maps a file's behavior on MITRE ATT&CK matrix.☆59Updated 5 years ago
- Useful resources for Zeek(https://zeek.org/) (Bro(http://bro.org/))☆31Updated 5 years ago
- Quickly generate suricata rules for IOCs☆29Updated 4 years ago
- A python app to predict Att&ck tactics and techniques from cyber threat reports☆124Updated last year
- Suricata rule and intel index☆31Updated last month
- Simple web shell scanner written in Golang.☆90Updated 6 years ago
- Web shell scanner and analyzer.☆111Updated 2 years ago