daffainfo / suricata-rulesLinks
Suricata rules that can detect a wide range of threats, including malware, exploits, and other malicious activity especially web application attacks
☆55Updated last year
Alternatives and similar repositories for suricata-rules
Users that are interested in suricata-rules are comparing it to the libraries listed below
Sorting:
- Packet captures of malicious traffic for analysis using Wireshark☆62Updated 2 years ago
- yara detection rules for hunting with the threathunting-keywords project☆152Updated 5 months ago
- Cyber Security Awareness Framework (CSAF)☆100Updated 7 months ago
- Cyber Threat Intelligence Data, Indicators, and Analysis☆99Updated last month
- Source code used at TweetFeed.live☆47Updated 2 years ago
- firedrill is a malware simulation harness for evaluating your security controls☆194Updated last year
- MITRE Caldera™ for OT Plugins & Capabilities☆227Updated 2 months ago
- Signatures and IoCs from public Volexity blog posts.☆359Updated last month
- Really can protect from ransomware encryption?☆46Updated last year
- ☆195Updated last year
- ShellSweeping the evil.☆181Updated 11 months ago
- Tool to discover external and internal network attack surface☆203Updated last year
- Threat Hunting queries for various attacks☆239Updated last week
- IOCs published by Black Lotus Labs☆124Updated last week
- Repo Filled With Follow Along Guides☆79Updated 3 years ago
- Suricata rules for network anomaly detection☆175Updated 2 weeks ago
- Welcome to the SEKOIA.IO Community repository!☆165Updated 3 months ago
- MAD ATT&CK Defender: ATT&CK Adversary Emulation Repository☆122Updated 2 years ago
- Some Threat Hunting queries useful for blue teamers☆130Updated 3 years ago
- ☆52Updated 2 months ago
- Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports f…☆143Updated 2 years ago
- Repository resource for threat hunter☆158Updated 7 years ago
- Threat Intel Platform for T-POTs☆156Updated this week
- Incident Response collection and processing scripts with automated reporting scripts☆312Updated last year
- How to setup a honeypot with an IDS, ELK and TLS traffic inspection☆163Updated 3 years ago
- BlueBox Malware analysis Box and Cyber threat intelligence.☆43Updated 3 years ago
- Open IOC sharing platform☆61Updated 11 months ago
- Standard-Format Threat Intelligence Feeds☆124Updated this week
- Rapidly Search and Hunt through Linux Forensics Artifacts☆200Updated last year
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆106Updated 3 years ago