daffainfo / suricata-rules
Suricata rules that can detect a wide range of threats, including malware, exploits, and other malicious activity especially web application attacks
☆39Updated 7 months ago
Related projects ⓘ
Alternatives and complementary repositories for suricata-rules
- Cyber Threat Intelligence Data, Indicators, and Analysis☆74Updated last month
- Packet captures of malicious traffic for analysis using Wireshark☆54Updated last year
- BlueBox Malware analysis Box and Cyber threat intelligence.☆38Updated 2 years ago
- Cyber Security Awareness Framework (CSAF)☆87Updated 2 weeks ago
- ☆43Updated 7 months ago
- SIEM Cheat Sheet☆72Updated last year
- An offline Phishing Email Analyzer. Enabling non-techies to analyze phishing emails automatically!☆54Updated last year
- yara detection rules for hunting with the threathunting-keywords project☆87Updated this week
- Source code used at TweetFeed.live☆38Updated 2 years ago
- Repository of tools and resources for analyzing Docker containers☆59Updated last year
- Template to detect some malware☆12Updated last year
- ☆32Updated last week
- First iteration of ML based Feedback WAF☆57Updated 8 months ago
- Useful resources about phishing email analysis☆76Updated 2 years ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆59Updated 10 months ago
- This is vulnerable microservice written in many language to demonstrating OWASP API Top Security Risk (under development)☆42Updated last year
- These are installation notes based on Mayfly's installation notes. They are more streamlined for Vagrant as I did not take the Docker rou…☆22Updated 5 months ago
- Tor onion address lookup☆32Updated last month
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆37Updated last year
- Really can protect from ransomware encryption?☆42Updated 6 months ago
- This page is a result of the ongoing hands-on research around advanced Linux attacks, detection and forensics techniques and tools.☆126Updated last year
- Sniffing out well-known threat groups☆28Updated 3 months ago
- BSidesRoc 2022 Linux Malware/Forensics Course☆71Updated 2 years ago
- Shortemall is a Python-based tool that automates the process of scanning hidden content of Short URLs.☆85Updated 7 months ago
- GCP cloud security CTF☆41Updated 8 months ago
- Finding Missing People, extract information in Dark Web and Surfaceweb Investigation and Human Trafficking Support☆24Updated 5 months ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆104Updated 2 years ago