conix-security / bl2ru2Links
Mass Suricata rules creator, from a list of domain
☆14Updated 7 years ago
Alternatives and similar repositories for bl2ru2
Users that are interested in bl2ru2 are comparing it to the libraries listed below
Sorting:
- Suricata rule and intel index☆33Updated 3 weeks ago
- A Yara Lua output script for Suricata☆20Updated 6 years ago
- ☆12Updated 5 years ago
- The OTX Suricata Rule Generator can be used to create the rules and configuration for Suricata to alert on indicators from your OTX accou…☆113Updated last year
- Kibana 6 Templates for Suricata IDPS Threat Hunting☆24Updated 6 years ago
- Threat Intelligence with Elastic - Minemeld integration with Elasticsearch☆19Updated 4 years ago
- An Ansible playbook for deploying the Suricata intrusion detection system and fetching Snort rules with Oinkmaster.☆17Updated 4 years ago
- Script to perform bulk local GeoIP lookups (ASN and geo) for IP addresses☆102Updated 6 years ago
- How to Zeek Sysmon Logs!☆103Updated 3 years ago
- Suricata rules to detect Winnti communication☆16Updated 7 years ago
- Suricata RPMs for CentOS/RHEL and Fedora☆19Updated 3 weeks ago
- Wireshark plugin to display Suricata analysis info☆95Updated 4 years ago
- brostash: Linux distribution based on Debian and focusing on network security events collection☆33Updated 5 years ago
- Cyber Defence Monitoring Course Suite :: Suricata, Arkime (and others in the past)☆108Updated last year
- An Ubuntu 16.04 build containing Suricata, PulledPork, Bro, and Splunk☆23Updated 7 years ago
- A lightweight tool to score network traffic and flag anomalies☆123Updated last year
- Snorpy is a python script the gives a Gui interface to help those new to snort create rules.☆65Updated last year
- Dovehawk is a Zeek module that automatically imports MISP indicators and reports Sightings☆122Updated 4 years ago
- Expandable Defensive Cyber Operations Platform☆44Updated 3 years ago
- Collection of Suricata rule sets that I use modified to my environments.☆39Updated 5 years ago
- Generates visualizations from the output of flow tools such as SiLK.☆35Updated 9 years ago
- Example Suricata rules implementing some of my detection tactics☆22Updated 3 years ago
- Core elements of the Modern Honey Network implemented in Docker☆35Updated 3 years ago
- ioc2rpz is a place where threat intelligence meets DNS.☆112Updated last year
- Updates the Emerging Threats open ruleset for Suricata☆10Updated 10 years ago
- 🤖 Daily updated translation maps for T-Pot☆22Updated last year
- A website and framework for testing NIDS detection☆57Updated 4 years ago
- Bro IDS + ELK Stack to detect and block data exfiltration☆46Updated 7 years ago
- Prototype system to monitor BGP routes and alert when anomalies are identified☆15Updated 7 years ago
- Top DNS Measurement for Bro☆11Updated 5 years ago