Suricata rules that can detect a wide range of threats, including malware, exploits, and other malicious activity especially web application attacks
☆60Apr 2, 2024Updated last year
Alternatives and similar repositories for suricata-rules
Users that are interested in suricata-rules are comparing it to the libraries listed below
Sorting:
- Template to detect some malware☆14Aug 7, 2023Updated 2 years ago
- Aggregated wordlist pulled from commonly used tools for discovery, enumeration, fuzzing, and exploitation.☆11Dec 30, 2020Updated 5 years ago
- Repo for hosting various scripts for creating users for password spraying and other password attacks.☆11Jul 9, 2020Updated 5 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆13Aug 26, 2021Updated 4 years ago
- CSbyGB - Gabrielle B's new Blog!☆23Jul 29, 2025Updated 7 months ago
- Collection of solidity code in eBook☆26Jun 24, 2024Updated last year
- Generate HTML Pages using JSON/YAML☆30Apr 10, 2023Updated 2 years ago
- Lena's scripts/code/resources for malware analysis☆26Jun 13, 2024Updated last year
- ☆12Jul 27, 2022Updated 3 years ago
- Example rabbitmq rpc pattern using messaging pattern (Request & Reply)☆12Aug 23, 2023Updated 2 years ago
- Developing an open source Windows EDR written in C & C++ & C#☆28Updated this week
- Maintained by the ANY.RUN team, this repository provides YARA rules to help detect and classify various malware families and other malici…☆26Nov 1, 2025Updated 4 months ago
- Links to VeteranSec Resources☆12May 18, 2020Updated 5 years ago
- Python3 script to quickly get various information from a domain controller through his LDAP service.☆11Feb 23, 2022Updated 4 years ago
- CTF Writeups☆184Dec 25, 2024Updated last year
- This is an AI Agent for Students☆10Jan 26, 2025Updated last year
- Automate All Pivoting System Enumeration with this Bash Script☆13Nov 7, 2022Updated 3 years ago
- Simple sdk golang.☆12Oct 11, 2023Updated 2 years ago
- Simple Python Modular Script to Broke Web Logins☆15Oct 7, 2022Updated 3 years ago
- Docker images of PowerDNS software built on Alpine Linux☆20Apr 25, 2023Updated 2 years ago
- A demonstration of domain generation algorithm (DGA) and determing regular expression and yara rule for each dga.☆16Sep 4, 2024Updated last year
- Config files for my GitHub profile.☆13Oct 9, 2022Updated 3 years ago
- A password spraying tool for Microsoft Online accounts (Azure/O365). The script logs if a user cred is valid, if MFA is enabled on the ac…☆19Apr 11, 2022Updated 3 years ago
- ☆13Mar 11, 2026Updated last week
- Short Python script for parsing Defender VDM signature files.☆10Sep 22, 2024Updated last year
- YARA rule analyzer to improve rule quality and performance☆113Jan 18, 2026Updated 2 months ago
- Windows Shell Link (LNK) Proof of Concept☆16Jul 19, 2025Updated 8 months ago
- Add billing to your app in 5 minutes with Paddle and Kanuu☆12Nov 29, 2020Updated 5 years ago
- ☆52Oct 10, 2025Updated 5 months ago
- Tests your API automatically for common API vulnerabilities. Project is still Work In Progress. PRs are appreciated.☆34Apr 12, 2024Updated last year
- Draugnet is a lightweight, open-source tool for anonymous cyber threat reporting. Built for the MISP ecosystem, it lets users submit and …☆20Feb 26, 2026Updated 3 weeks ago
- 🚀 Smallest event emitter for JavaScript with all the power of ES6 Maps!☆11Jul 25, 2019Updated 6 years ago
- A CLI tool to download from HTTP/S for GNU/Weeb. Like wget, but can parallelize the download.☆22Dec 27, 2025Updated 2 months ago
- Command line client for HackTheBox☆25Feb 26, 2024Updated 2 years ago
- A curated list of awesome things related to Suricata☆221Nov 21, 2025Updated 4 months ago
- Identify containers at runtime and observe them. No container runtime required. Read only access to the kernel.☆17Jul 24, 2021Updated 4 years ago
- ☆18Feb 9, 2021Updated 5 years ago
- Go script for bypassing 403 forbidden☆160Aug 6, 2021Updated 4 years ago
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Jun 5, 2023Updated 2 years ago