Snorpy is a python script the gives a Gui interface to help those new to snort create rules.
☆66Aug 19, 2024Updated last year
Alternatives and similar repositories for Snorpy
Users that are interested in Snorpy are comparing it to the libraries listed below
Sorting:
- A Yara Lua output script for Suricata☆20Apr 7, 2019Updated 6 years ago
- Mass Suricata rules creator, from a list of domain☆14Sep 14, 2018Updated 7 years ago
- cuckoo-1.1 fork with suricata/moloch/clamav and other goodies☆23Feb 17, 2015Updated 11 years ago
- An Ansible playbook for deploying the Suricata intrusion detection system and fetching Snort rules with Oinkmaster.☆17Oct 30, 2021Updated 4 years ago
- How to send structured Snort IDS alert logs into Graylog☆27Oct 20, 2025Updated 4 months ago
- Example Suricata rules implementing some of my detection tactics☆22Jan 13, 2023Updated 3 years ago
- Kibana 6 Templates for Suricata IDPS Threat Hunting☆24Mar 5, 2019Updated 7 years ago
- Templates for Kibana/Logstash to use with Suricata IDPS☆81Mar 12, 2016Updated 9 years ago
- vncreplay replays a VNC session from captured network traffic☆10Apr 15, 2025Updated 10 months ago
- cuckoo sandbox patches and scripts☆15Jan 30, 2014Updated 12 years ago
- Community-based CybergON-powered Suricata rules☆12Jul 5, 2022Updated 3 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Sep 17, 2019Updated 6 years ago
- This is a gem that provides the ability to create a workspace, import scan data from nexpose, and perform a webscan, a web audit, and per…☆10Dec 13, 2017Updated 8 years ago
- Command-line tool to format and syntax highlight Suricata rules☆13Nov 30, 2019Updated 6 years ago
- Quickly generate suricata rules for IOCs☆28Apr 30, 2021Updated 4 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Apr 18, 2020Updated 5 years ago
- ☆12Apr 23, 2020Updated 5 years ago
- Bro things..☆15Oct 23, 2015Updated 10 years ago
- Transfer Kippo data to ElasticSearch☆18Dec 14, 2015Updated 10 years ago
- ☆12Jan 28, 2020Updated 6 years ago
- Suricata rules for network anomaly detection☆183Feb 7, 2026Updated last month
- PHPMiner is a web interface for cgminer on linux machines☆35Apr 2, 2014Updated 11 years ago
- Mikrotik's Winbox in a docker container accessible via noVNC through a web browser.☆13May 12, 2025Updated 9 months ago
- Add POST body excerpt to Bro's HTTP log☆14Dec 10, 2025Updated 2 months ago
- Suricata rules to detect Winnti communication☆16Mar 5, 2018Updated 8 years ago
- ☆35Dec 9, 2023Updated 2 years ago
- Corelight-Ansible-Roles are a collection of Ansible Roles and playbooks that install, configure, run and manage a variety of Corelight, S…☆16Jun 15, 2021Updated 4 years ago
- Sandbox feature upgrade with the help of wrapped samples☆76Jun 23, 2018Updated 7 years ago
- Configure and manage mikrotik devices remotelly via api.☆13Mar 30, 2016Updated 9 years ago
- Passbolt CE installation scripts☆19Mar 16, 2021Updated 4 years ago
- Kibana 7 Templates for Suricata IDPS Threat Hunting☆43Dec 23, 2025Updated 2 months ago
- Remote Desktop Client Fingerprint script for Zeek. Based off of https://github.com/0x4D31/fatt☆40Jun 20, 2023Updated 2 years ago
- Quickly generate snort rules for IOCs☆18Oct 21, 2015Updated 10 years ago
- python SDK for CIFv2☆13Nov 5, 2019Updated 6 years ago
- A Python ctypes package for libyara☆31Aug 4, 2015Updated 10 years ago
- A python network scanner using scapy☆24Mar 21, 2020Updated 5 years ago
- useful mikrotik functions☆21Oct 8, 2025Updated 4 months ago
- Meer (GPLv2) is a dedicated "spooler" for the Suricata & Sagan EVE output formats.☆23Feb 9, 2021Updated 5 years ago
- A set of hashcat hcmask files, prioritized by cracking efficiency... and the hcmask_Generator_9000.xlsx tool.☆25Dec 17, 2023Updated 2 years ago