bhdresh / SnortRules
This is an open source Snort rules repository
☆30Updated 2 years ago
Alternatives and similar repositories for SnortRules:
Users that are interested in SnortRules are comparing it to the libraries listed below
- Suricata rules for the new critical vulnerabilities☆80Updated 3 years ago
- This repository will hold PCAP IOC data related with known malware samples (owner: Bryant Smith)☆99Updated 3 years ago
- Collection of various open-source an commercial rulesets for NIDS (especially for Suricata and Snort)☆23Updated last year
- Anomaly detection based on DNS traffic analysis☆51Updated 4 years ago
- Explore Indicators of Compromise Automatically☆94Updated 4 years ago
- Configuring the Suricata IDS to detect DoS attacks by adding custom rule file.☆39Updated 4 years ago
- Download pcap files from http://www.malware-traffic-analysis.net/☆73Updated 7 years ago
- Useful resources for Zeek(https://zeek.org/) (Bro(http://bro.org/))☆32Updated 4 years ago
- ☆54Updated 6 months ago
- Quickly generate suricata rules for IOCs☆28Updated 3 years ago
- ☆41Updated 2 years ago
- Suspicious DGA from PDNS and Sandbox.☆183Updated 2 years ago
- Using Python script instead of Nmap NSE script to detect ICS protocols[根据nmap nse脚本来编写工控协议识别的python脚本]☆32Updated 4 years ago
- CVE2020-0796 SMBv3 RCE☆61Updated 4 years ago
- Collection of Suricata rule sets that I use modified to my environments.☆39Updated 4 years ago
- 威胁检测规则集☆15Updated 5 years ago
- Suricata rules for network anomaly detection☆154Updated last month
- Pull some Malware samples here for other security researchers/malware analyst's to analyze and play with.☆174Updated 7 months ago
- Advanced threat detection solution for Linux.☆36Updated 4 years ago
- A Python script that generates Snort IDS rules from network packets☆25Updated 7 years ago
- Mapping NSM rules to MITRE ATT&CK☆68Updated 4 years ago
- Generate JSON force-directed/ node graph data from MITRE's ATTACK framework and visualize it interactively☆22Updated 3 years ago
- zeek-scripts☆43Updated 6 years ago
- The OTX Suricata Rule Generator can be used to create the rules and configuration for Suricata to alert on indicators from your OTX accou…☆108Updated 8 months ago
- This is a project of "Cybersecurity Event Detection with New and Re-emerging Words". (ASIACCS 2020)☆28Updated 9 months ago
- A python app to predict Att&ck tactics and techniques from cyber threat reports☆118Updated last year
- ☆35Updated last year
- suricata IDS的规则,测试在用的,部分自写的规则视情况放出。☆18Updated 5 years ago