daffainfo / suricata-rulesLinks
Suricata rules that can detect a wide range of threats, including malware, exploits, and other malicious activity especially web application attacks
☆60Updated last year
Alternatives and similar repositories for suricata-rules
Users that are interested in suricata-rules are comparing it to the libraries listed below
Sorting:
- Packet captures of malicious traffic for analysis using Wireshark☆64Updated 2 years ago
- Cyber Threat Intelligence Data, Indicators, and Analysis☆107Updated last week
- yara detection rules for hunting with the threathunting-keywords project☆157Updated 8 months ago
- Source code used at TweetFeed.live☆48Updated 3 years ago
- Cyber Security Awareness Framework (CSAF)☆100Updated this week
- Repo Filled With Follow Along Guides☆80Updated 3 years ago
- firedrill is a malware simulation harness for evaluating your security controls☆197Updated 2 years ago
- ☆52Updated 5 months ago
- This repository is for Indicators of Compromise (IOCs) from Zscaler ThreatLabz public reports☆78Updated this week
- Fast IOC and YARA Scanner☆88Updated 5 years ago
- Welcome to the SEKOIA.IO Community repository!☆174Updated last month
- BlueBox Malware analysis Box and Cyber threat intelligence.☆46Updated 3 years ago
- Suricata rules for network anomaly detection☆182Updated 2 months ago
- Graphical map of known Advanced Persistent Threats☆62Updated this week
- Threat Hunting queries for various attacks☆244Updated 2 weeks ago
- Pathfinder is a plugin for mapping network vulnerabilities, scanned by CALDERA or imported by a supported network scanner, and translatin…☆128Updated 9 months ago
- Indicators of Compromise☆247Updated 2 weeks ago
- Repository resource for threat hunter☆158Updated 7 years ago
- Resources To Learn And Understand SIGMA Rules☆182Updated 2 years ago
- Top ATT&CK Techniques helps defenders approach the breadth and complexity of MITRE ATT&CK® with a prioritized top 10 list of techniques t…☆122Updated 8 months ago
- This Repository consists all Public Cheatsheets created by BlackPerl DFIR Content Team☆20Updated last year
- ShellSweeping the evil.☆181Updated last year
- MISP Playbooks☆222Updated 3 months ago
- An offline Phishing Email Analyzer. Enabling non-techies to analyze phishing emails automatically!☆63Updated 2 years ago
- MAD ATT&CK Defender: ATT&CK Adversary Emulation Repository☆127Updated 2 years ago
- Purpleteam scripts simulation & Detection - trigger events for SOC detections☆192Updated last year
- Raw data from Threat Intelligence Reports with automatic reports collection and keyword search across thousands of reports☆148Updated this week
- Open IOC sharing platform☆65Updated last month
- Some Threat Hunting queries useful for blue teamers☆131Updated 3 years ago
- Zeek-Formatted Threat Intelligence Feeds☆383Updated this week