Mass Suricata rules creator, from a list of domain
☆14Sep 14, 2018Updated 7 years ago
Alternatives and similar repositories for bl2ru2
Users that are interested in bl2ru2 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Yara Lua output script for Suricata☆20Apr 7, 2019Updated 7 years ago
- Sankey diagram for Kibana visualize.☆32Dec 5, 2024Updated last year
- CGNAT em dispositivos baseados em RouterOS☆12May 14, 2019Updated 6 years ago
- Kibana 6 Templates for Suricata IDPS Threat Hunting☆24Mar 5, 2019Updated 7 years ago
- scripts to setup servers, as quickly as possible☆10Updated this week
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Ingest Nessus files into Elasticsearch using PowerShell!☆19Mar 22, 2026Updated last month
- Quickly generate suricata rules for IOCs☆28Apr 30, 2021Updated 5 years ago
- Suricata rules for Emerging Threats and funkyness☆75May 15, 2017Updated 8 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Sep 17, 2019Updated 6 years ago
- Cyber Defence Monitoring Course Suite :: Suricata, Bro, Moloch☆61Feb 20, 2017Updated 9 years ago
- ☆11Jun 30, 2016Updated 9 years ago
- Get Mikrotik's accounting data and push it to influxdb.☆30Oct 31, 2022Updated 3 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆13Apr 18, 2020Updated 6 years ago
- RouterOS (Mikrotik) Backup over SSH☆19Feb 17, 2014Updated 12 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Mikrotik bot telegram, http://mikbotam.github.io☆14Apr 2, 2019Updated 7 years ago
- Mikrotik script which detects DDoS attacks☆12Feb 27, 2016Updated 10 years ago
- Mikrotik, Bot Telegram☆15Jul 11, 2019Updated 6 years ago
- A simple Mikrotik traffic counter script with web interface☆19Jan 6, 2015Updated 11 years ago
- Collection of Utilities and Templates to extend HPE's Intelligent Management Center NMS Platform☆12Sep 19, 2018Updated 7 years ago
- ☆12Jan 28, 2020Updated 6 years ago
- ☆35Dec 9, 2023Updated 2 years ago
- IPS Suricata2MikroTik -CE- is a module for Suricata to read eve.json file and search specifics alert to block the source. This connect to…☆33Feb 3, 2023Updated 3 years ago
- CLI tool for testing Office documents with macros using MaliciousMacroBot☆12Dec 3, 2023Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Monitors and stores the total amount of traffic on a MikroTik router interface using a web-server with sqlite, php and d3.js☆14Mar 15, 2017Updated 9 years ago
- Notepad++ Syntax Highlighting for Languages Used by Cyber Security Professionals☆14May 31, 2020Updated 5 years ago
- JSS Autopkg recipes☆12Mar 19, 2026Updated last month
- Generic ASM Vulnerability Schema XSLT☆12May 30, 2018Updated 7 years ago
- PowerShell Script for Agentless Incident Response☆25Apr 5, 2018Updated 8 years ago
- Actionable analytics designed to combat threats based on MITRE's ATT&CK.☆23Aug 21, 2019Updated 6 years ago
- ☆13Aug 13, 2021Updated 4 years ago
- Allows to simulate upstream centos / ubuntu / opensuse package repository servers by using a docker container which contains a local pack…☆15Mar 25, 2025Updated last year
- Python Script to automation Cisco & Mikrotik Devices☆21Apr 14, 2018Updated 8 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- 针对《解密家用路由器0day漏洞挖掘技术》一书的相关笔记☆16Oct 12, 2020Updated 5 years ago
- Automatic backup Mikrotik router via ssh☆26Jul 2, 2015Updated 10 years ago
- Example Suricata rules implementing some of my detection tactics☆22Jan 13, 2023Updated 3 years ago
- The OTX Suricata Rule Generator can be used to create the rules and configuration for Suricata to alert on indicators from your OTX accou…☆118Apr 26, 2024Updated 2 years ago
- CertWatcher is a new take on monitoring for phishing sites. It is meant to be a set and forget service that will send you a daily report …☆10Oct 12, 2020Updated 5 years ago
- Suricata rules to detect Winnti communication☆16Mar 5, 2018Updated 8 years ago
- ☆12Apr 23, 2020Updated 6 years ago