daffainfo / suricata-rulesLinks
Suricata rules that can detect a wide range of threats, including malware, exploits, and other malicious activity especially web application attacks
☆59Updated last year
Alternatives and similar repositories for suricata-rules
Users that are interested in suricata-rules are comparing it to the libraries listed below
Sorting:
- Packet captures of malicious traffic for analysis using Wireshark☆63Updated 2 years ago
- yara detection rules for hunting with the threathunting-keywords project☆156Updated 7 months ago
- Cyber Threat Intelligence Data, Indicators, and Analysis☆104Updated last month
- Cyber Security Awareness Framework (CSAF)☆101Updated 9 months ago
- Source code used at TweetFeed.live☆47Updated 3 years ago
- ☆52Updated 4 months ago
- BlueBox Malware analysis Box and Cyber threat intelligence.☆45Updated 3 years ago
- Website defacement attack detection with deep learning☆62Updated 11 months ago
- Repo Filled With Follow Along Guides☆80Updated 3 years ago
- Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports f…☆142Updated 2 years ago
- MITRE Caldera™ for OT Plugins & Capabilities☆230Updated last week
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆67Updated last year
- ShellSweeping the evil.☆181Updated last year
- Open IOC sharing platform☆63Updated last year
- Welcome to the SEKOIA.IO Community repository!☆171Updated this week
- Tool to discover external and internal network attack surface☆204Updated last year
- Threat Hunting queries for various attacks☆244Updated this week
- firedrill is a malware simulation harness for evaluating your security controls☆195Updated last year
- This home-lab provides individuals with hands-on experience in setting up, configuring, and utilizing Suricata to enhance network securit…☆30Updated last year
- Some Threat Hunting queries useful for blue teamers☆131Updated 3 years ago
- Just some lists of Malware Configs☆173Updated 11 months ago
- How to setup a honeypot with an IDS, ELK and TLS traffic inspection☆164Updated 3 years ago
- Interactive, dynamic, and realistic LLM honeypots☆71Updated 10 months ago
- Extensible framework for analyzing publicly available information about vulnerabilities☆128Updated last week
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆87Updated 3 years ago
- The ICS Advisory Project is an open-source project to provide DHS CISA ICS Advisories data in Comma Separated Value (CSV) format to suppo…☆88Updated this week
- Suricata rules for network anomaly detection☆180Updated 3 weeks ago
- Signatures and IoCs from public Volexity blog posts.☆361Updated 2 weeks ago
- ☆45Updated 3 years ago
- First iteration of ML based Feedback WAF☆59Updated last year