daffainfo / suricata-rulesLinks
Suricata rules that can detect a wide range of threats, including malware, exploits, and other malicious activity especially web application attacks
☆51Updated last year
Alternatives and similar repositories for suricata-rules
Users that are interested in suricata-rules are comparing it to the libraries listed below
Sorting:
- Packet captures of malicious traffic for analysis using Wireshark☆60Updated 2 years ago
- Cyber Threat Intelligence Data, Indicators, and Analysis☆95Updated last month
- Source code used at TweetFeed.live☆44Updated 2 years ago
- yara detection rules for hunting with the threathunting-keywords project☆127Updated 3 months ago
- Cyber Security Awareness Framework (CSAF)☆100Updated 5 months ago
- BlueBox Malware analysis Box and Cyber threat intelligence.☆43Updated 3 years ago
- MAD ATT&CK Defender: ATT&CK Adversary Emulation Repository☆119Updated 2 years ago
- Just some lists of Malware Configs☆172Updated 7 months ago
- This home-lab provides individuals with hands-on experience in setting up, configuring, and utilizing Suricata to enhance network securit…☆20Updated last year
- Open IOC sharing platform☆60Updated 9 months ago
- How to setup a honeypot with an IDS, ELK and TLS traffic inspection☆160Updated 3 years ago
- Repository resource for threat hunter☆158Updated 6 years ago
- Threat Hunting queries for various attacks☆239Updated this week
- ☆197Updated last year
- Blue Team detection lab created with Terraform and Ansible in Azure.☆162Updated 9 months ago
- Welcome to the SEKOIA.IO Community repository!☆163Updated last month
- 🏴☠️💰 Another Ransomware gang tracker☆244Updated 2 weeks ago
- Purpleteam scripts simulation & Detection - trigger events for SOC detections☆189Updated 8 months ago
- Really can protect from ransomware encryption?☆46Updated last year
- IOCs published by Black Lotus Labs☆122Updated 3 months ago
- MISP Playbooks☆207Updated 2 months ago
- This repository contains Malicious Indicator of Compromise (IOC) blocklist for MISP, firewall which is vital for cybersecurity profession…☆109Updated this week
- Incident Response - Fast suspicious file finder☆246Updated 3 years ago
- ☆53Updated 2 weeks ago
- Incident Response with Threat Intelligence, published by Packt☆53Updated last year
- This repository is for Indicators of Compromise (IOCs) from Zscaler ThreatLabz public reports☆73Updated last month
- Indicators of Compromise☆217Updated 2 weeks ago
- SIEM Cheat Sheet☆76Updated 2 years ago
- Signatures and IoCs from public Volexity blog posts.☆354Updated 3 months ago
- firedrill is a malware simulation harness for evaluating your security controls☆188Updated last year