daffainfo / suricata-rulesLinks
Suricata rules that can detect a wide range of threats, including malware, exploits, and other malicious activity especially web application attacks
☆53Updated last year
Alternatives and similar repositories for suricata-rules
Users that are interested in suricata-rules are comparing it to the libraries listed below
Sorting:
- yara detection rules for hunting with the threathunting-keywords project☆151Updated 5 months ago
- Packet captures of malicious traffic for analysis using Wireshark☆62Updated 2 years ago
- Cyber Threat Intelligence Data, Indicators, and Analysis☆97Updated last week
- Source code used at TweetFeed.live☆46Updated 2 years ago
- Cyber Security Awareness Framework (CSAF)☆100Updated 7 months ago
- ShellSweeping the evil.☆180Updated 10 months ago
- firedrill is a malware simulation harness for evaluating your security controls☆193Updated last year
- Open IOC sharing platform☆61Updated 11 months ago
- Graphical map of known Advanced Persistent Threats☆58Updated 6 months ago
- Threat Hunting queries for various attacks☆239Updated this week
- Incident Response - Fast suspicious file finder☆244Updated 3 years ago
- MITRE Caldera™ for OT Plugins & Capabilities☆226Updated 2 months ago
- Just some lists of Malware Configs☆172Updated 9 months ago
- This repository contains Malicious Indicator of Compromise (IOC) blocklist for MISP, firewall which is vital for cybersecurity profession…☆115Updated last month
- ☆52Updated 2 months ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆68Updated last year
- Raw data from Threat Intelligence Reports with automatic reports collection and keyword search across thousands of reports☆138Updated last week
- Welcome to the SEKOIA.IO Community repository!☆164Updated 3 months ago
- IOCs published by Black Lotus Labs☆122Updated last month
- Rapidly Search and Hunt through Linux Forensics Artifacts☆200Updated last year
- ☆195Updated last year
- MISP Playbooks☆214Updated this week
- ☆31Updated last year
- MAD ATT&CK Defender: ATT&CK Adversary Emulation Repository☆121Updated 2 years ago
- 🏴☠️💰 Another Ransomware gang tracker☆263Updated last month
- Some Threat Hunting queries useful for blue teamers☆129Updated 3 years ago
- This Repository consists all Public Cheatsheets created by BlackPerl DFIR Content Team☆20Updated last year
- PowerShell Script Analyzer☆70Updated last year
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆150Updated last year
- Building a consolidated RSS feed for articles about cyberattacks☆72Updated this week