This is an open source Snort rules repository
☆30May 31, 2022Updated 3 years ago
Alternatives and similar repositories for SnortRules
Users that are interested in SnortRules are comparing it to the libraries listed below
Sorting:
- Snort rules☆11Oct 22, 2015Updated 10 years ago
- A Python script that generates Snort IDS rules from network packets☆24Oct 30, 2017Updated 8 years ago
- Go library to allow native inline hooking in windows at runtime☆14Feb 7, 2024Updated 2 years ago
- GitHub CVE Repository Hunt☆18Jul 23, 2024Updated last year
- Development repository for the snort cookbook☆27Mar 2, 2026Updated 2 weeks ago
- Help deobfuscate VBScript☆18Jul 1, 2022Updated 3 years ago
- x64 Windows package of the shellcode2exe tool☆14Nov 23, 2020Updated 5 years ago
- A tweaked version of SdFat to improve block read speed☆11Nov 23, 2015Updated 10 years ago
- ProcessBouncer is a simple but effective tool for blocking malware with a process-based approach. With a little fine-tuning this allows t…☆25Apr 9, 2021Updated 4 years ago
- ☆15May 6, 2021Updated 4 years ago
- Suricata, Snort and Zeek IDS rule and pcap testing system☆511Mar 13, 2026Updated last week
- ☆14Jan 19, 2022Updated 4 years ago
- ☆12Jun 20, 2022Updated 3 years ago
- Tool for obtaining information about PPL processes☆16Feb 12, 2024Updated 2 years ago
- Realtime Face Mask Detection in ~10 lines of Python Code☆10Nov 10, 2020Updated 5 years ago
- ☆12Oct 15, 2024Updated last year
- ☆17Oct 26, 2018Updated 7 years ago
- Files of Learn Object Oriented PHP while building a secure & scalable authentication system with validation & database handling.☆10Nov 1, 2017Updated 8 years ago
- Simple bot to send waktu solat to discord using webhook☆10Jan 1, 2024Updated 2 years ago
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- 资产发现,控制nmap进行扫描,spring/reactjs 前后端分离项目☆13Apr 9, 2020Updated 5 years ago
- Open source SDR LTE software suite from Software Radio Systems (SRS)☆14Sep 6, 2019Updated 6 years ago
- dorkX is a tool to do google dork in seconds and the results will be saved in results.txt☆10Oct 16, 2025Updated 5 months ago
- A multi-functional toolkit for social engineering, phishing, email spoofing, SMS/OTP bombing, keylogging, and security audits — built for…☆24Mar 11, 2026Updated last week
- HWP Document Fuzzer (Simple OLE Structure Parsing)☆15Dec 30, 2014Updated 11 years ago
- ☆61Aug 21, 2023Updated 2 years ago
- Tor command line tools for Mac☆12Jan 20, 2016Updated 10 years ago
- kb-security是一个可本地部署的WEB安全学习平台,可以帮助你更快的学习和掌握WEB安全知识。☆13Dec 10, 2022Updated 3 years ago
- All Write-up pushed by RasyidMF. This repository is created for private or public learning purposes☆10Oct 16, 2020Updated 5 years ago
- a Burp Extender that add an random X-Forward-For IP address for each request☆31Aug 12, 2016Updated 9 years ago
- This repository is for Quectel customers to download documents and tools conveniently. All rights are reserved by Quectel Wirelss Solutio…☆14Nov 4, 2021Updated 4 years ago
- Are you able to use open source intelligence to solve this challenge?☆11Apr 14, 2019Updated 6 years ago
- Use Frida DBI to instrument binary and perform basic-block code coverage that is fed back to AFL.☆12Nov 23, 2019Updated 6 years ago
- simple self-improvement agent☆27Mar 25, 2024Updated last year
- scripts for use with xfce4 panel generic monitor (xfce4-genmon-plugin)☆15Apr 22, 2022Updated 3 years ago
- ☆13May 31, 2023Updated 2 years ago
- ☆24Mar 2, 2026Updated 2 weeks ago
- Suricata rules for the new critical vulnerabilities☆84Jan 26, 2021Updated 5 years ago
- A curated list of GPT agents for cybersecurity☆21Feb 2, 2024Updated 2 years ago