cristianmenghi / pfsense-snortView external linksLinks
Suppress list for snort in pfsense
☆21Apr 7, 2016Updated 9 years ago
Alternatives and similar repositories for pfsense-snort
Users that are interested in pfsense-snort are comparing it to the libraries listed below
Sorting:
- Snort_rules detection bad actors.☆29Aug 18, 2024Updated last year
- List of scripts used for malware analysis☆15Aug 10, 2015Updated 10 years ago
- Snort Rules☆19Mar 9, 2016Updated 9 years ago
- IRC bot framework written in Python.☆30Mar 20, 2021Updated 4 years ago
- AYY LMAO☆22Mar 26, 2016Updated 9 years ago
- The Grum Spam Bot☆20Feb 25, 2015Updated 10 years ago
- Snort rules to detect local malware, phishing, and adult content by inspecting DNS responses from OpenDNS☆52Sep 16, 2016Updated 9 years ago
- This is a malware analysis project which expecte to generate snort rule via malicious network traffic☆28Apr 13, 2023Updated 2 years ago
- Simple IP Information Tools for Reputation Data Analysis☆23Dec 24, 2018Updated 7 years ago
- autossh-init - AutoSSH init script☆38Nov 9, 2013Updated 12 years ago
- Digital Forensics and Incident Response Wiki☆40May 19, 2014Updated 11 years ago
- Security information and event management, masters's diploma☆10Aug 3, 2015Updated 10 years ago
- Coalfire GCP RAMP/pak Reference Architecture☆13Feb 5, 2026Updated last week
- The C-Agent is a reference implementation of a Keyfactor Orchestrator geared toward use in IoT based solutions.☆12Aug 28, 2025Updated 5 months ago
- Azure Deployment Templates for Mandiant Managed Huning☆12Jun 1, 2023Updated 2 years ago
- ☆13Aug 28, 2025Updated 5 months ago
- Build a project with Express.js☆11Jan 31, 2021Updated 5 years ago
- Akira Bot adalah Bot Whatsapp yg Memiliki 500+ Fitur, dan Menggunakan Bermacam² Rest Api☆10Apr 6, 2021Updated 4 years ago
- TLS scanning component of OWASP PurpleTeam☆11Feb 8, 2023Updated 3 years ago
- a python script that automates recon flow for a given target domain.☆10Apr 21, 2022Updated 3 years ago
- An full-stack eCommerce store web application in nodejs☆11Jun 6, 2024Updated last year
- Knowledge space for some computerforensic stuff☆14Aug 15, 2014Updated 11 years ago
- ☆12Jun 1, 2024Updated last year
- Static Feature Extraction & Selection (used in conjunction with the MASTIFF framework)☆16Oct 19, 2016Updated 9 years ago
- Innora-Defender: 先进的勒索软件分析与恢复框架☆16May 6, 2025Updated 9 months ago
- Setup a RaspberryPi as a responder-in-a-box dropbox for Pentesting☆12Sep 22, 2017Updated 8 years ago
- Me and my team hack accounts for players of Prodigy Math Game that only have access to a mobile device/people who can't hack themselves.☆15Feb 4, 2022Updated 4 years ago
- PowerShell Module for Extrahop☆15Dec 13, 2018Updated 7 years ago
- This is a script to import Cisco Talos's IP Blacklist into a Tag (Host Group) within Stealthwatch. This will also optionally create a Cu…☆11May 22, 2023Updated 2 years ago
- Amazon Echo skill to trigger the native Apple Find My iPhone "play sound" feature. Written in Python 3.6 and deploys easily on AWS Lambda…☆13Aug 3, 2021Updated 4 years ago
- Interactive summary of Gartner's Magic Quadrant for Web Content Management with d3.js☆17Oct 15, 2012Updated 13 years ago
- GUI Tool to Generate Android Payloads.☆10May 20, 2020Updated 5 years ago
- metwork/mfserv module☆12Feb 7, 2026Updated last week
- Integration between SIEMs and TAXII services☆10Mar 2, 2023Updated 2 years ago
- Calendari elettronici per la raccolta rifiuti di Chieri e comuni limitrofi☆12Dec 23, 2025Updated last month
- CAPE monitor DLLs☆41Dec 3, 2019Updated 6 years ago
- Track your journey☆17Apr 3, 2015Updated 10 years ago
- iOS forensics utility☆12May 8, 2018Updated 7 years ago
- DTMFDuino receives DTMF tones through a MT8870 integrated circuit who converts the analog audio of tones to a binary code understandable …☆17Jan 31, 2013Updated 13 years ago