Suricata rules that can detect a wide range of threats, including malware, exploits, and other malicious activity especially web application attacks
☆62Apr 2, 2024Updated 2 years ago
Alternatives and similar repositories for suricata-rules
Users that are interested in suricata-rules are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Go script to guess an API key / OAuth token found during pentest. CLI version of https://github.com/daffainfo/apiguesser-web/☆45Aug 28, 2022Updated 3 years ago
- Aggregated wordlist pulled from commonly used tools for discovery, enumeration, fuzzing, and exploitation.☆11Dec 30, 2020Updated 5 years ago
- Repo for hosting various scripts for creating users for password spraying and other password attacks.☆11Jul 9, 2020Updated 5 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆13Aug 26, 2021Updated 4 years ago
- CSbyGB - Gabrielle B's new Blog!☆23Jul 29, 2025Updated 9 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Lena's scripts/code/resources for malware analysis☆26Jun 13, 2024Updated last year
- Generate HTML Pages using JSON/YAML☆30Apr 10, 2023Updated 3 years ago
- Plugin for x64dbg to generate Yara rules from function basic blocks.☆37Sep 2, 2017Updated 8 years ago
- Maintained by the ANY.RUN team, this repository provides YARA rules to help detect and classify various malware families and other malici…☆28Nov 1, 2025Updated 6 months ago
- Links to VeteranSec Resources☆12May 18, 2020Updated 6 years ago
- Poc of using youtube comments for C2 communications☆10Jul 6, 2021Updated 4 years ago
- Python3 script to quickly get various information from a domain controller through his LDAP service.☆11Feb 23, 2022Updated 4 years ago
- ☆10Sep 30, 2020Updated 5 years ago
- Detailed information about API key / OAuth token (Description, Request, Response, Regex, Example)☆294Sep 26, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Automate All Pivoting System Enumeration with this Bash Script☆13Nov 7, 2022Updated 3 years ago
- Simple sdk golang.☆12Oct 11, 2023Updated 2 years ago
- Simple Python Modular Script to Broke Web Logins☆15Oct 7, 2022Updated 3 years ago
- Web Application Firewall Benchmark☆12May 14, 2022Updated 4 years ago
- This repository provides a comprehensive Digital Footprint Checklist to help individuals manage their online presence and enhance privacy…☆17Dec 25, 2024Updated last year
- A demonstration of domain generation algorithm (DGA) and determing regular expression and yara rule for each dga.☆16Sep 4, 2024Updated last year
- ☆42Sep 16, 2022Updated 3 years ago
- Config files for my GitHub profile.☆13Oct 9, 2022Updated 3 years ago
- A password spraying tool for Microsoft Online accounts (Azure/O365). The script logs if a user cred is valid, if MFA is enabled on the ac…☆19Apr 11, 2022Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆13Mar 11, 2026Updated 2 months ago
- Automated Pentest Recon Scanner☆14Oct 6, 2017Updated 8 years ago
- Twitter Search to Cisco Threat Response Casebook [v1.0]☆15Dec 8, 2022Updated 3 years ago
- Add billing to your app in 5 minutes with Paddle and Kanuu☆12Nov 29, 2020Updated 5 years ago
- The ICS^2 Matrix is a threat taxonomy for Programmable Logic Controllers and Industrial Control Systems☆15Sep 10, 2024Updated last year
- ☆53Feb 21, 2025Updated last year
- A running list of Windows sources and the related event ids.☆19Aug 2, 2023Updated 2 years ago
- Command line client for HackTheBox☆25Feb 26, 2024Updated 2 years ago
- Collection of scripts to automate the Malware Analysis process☆34Oct 27, 2025Updated 6 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Identify containers at runtime and observe them. No container runtime required. Read only access to the kernel.☆16Jul 24, 2021Updated 4 years ago
- r2inspect is a professional malware analysis framework that automates deep static inspection for PE, ELF, and Mach-O binaries using the r…☆50Updated this week
- 🗺 A map of OSINT tools.☆20Jul 5, 2023Updated 2 years ago
- ☆20Jul 2, 2021Updated 4 years ago
- ☆24Dec 11, 2022Updated 3 years ago
- pcaps for Wireshark tutorial about examining Dridex infection traffic☆17Oct 8, 2020Updated 5 years ago
- This repo is dedicated to store all of programing interview test from a very simple one to a very hardest one, algorithm impmlementation …☆13Jan 25, 2019Updated 7 years ago