Suricata rules that can detect a wide range of threats, including malware, exploits, and other malicious activity especially web application attacks
☆61Apr 2, 2024Updated 2 years ago
Alternatives and similar repositories for suricata-rules
Users that are interested in suricata-rules are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Template to detect some malware☆14Aug 7, 2023Updated 2 years ago
- Go script to guess an API key / OAuth token found during pentest. CLI version of https://github.com/daffainfo/apiguesser-web/☆45Aug 28, 2022Updated 3 years ago
- Aggregated wordlist pulled from commonly used tools for discovery, enumeration, fuzzing, and exploitation.☆11Dec 30, 2020Updated 5 years ago
- Repo for hosting various scripts for creating users for password spraying and other password attacks.☆11Jul 9, 2020Updated 5 years ago
- Simple vulnerability labs that created using PHP and MySQL.☆16Dec 30, 2022Updated 3 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- CSbyGB - Gabrielle B's new Blog!☆23Jul 29, 2025Updated 9 months ago
- Lena's scripts/code/resources for malware analysis☆26Jun 13, 2024Updated last year
- ☆12Jul 27, 2022Updated 3 years ago
- Example rabbitmq rpc pattern using messaging pattern (Request & Reply)☆12Aug 23, 2023Updated 2 years ago
- Maintained by the ANY.RUN team, this repository provides YARA rules to help detect and classify various malware families and other malici…☆28Nov 1, 2025Updated 6 months ago
- Simple MoneyExpenses App (UI Only)☆19Mar 18, 2021Updated 5 years ago
- CTF Writeups☆185Dec 25, 2024Updated last year
- Detailed information about API key / OAuth token (Description, Request, Response, Regex, Example)☆290Sep 26, 2023Updated 2 years ago
- This Guidance demonstrates how to configure a proxy in a virtual private cloud (VPC) to connect external services to your Amazon VPC Latt…☆16Oct 19, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Docker images of PowerDNS software built on Alpine Linux☆20Apr 25, 2023Updated 3 years ago
- Scripts, tools, and proof-of-concepts to aid in a penetration test.☆24May 11, 2016Updated 9 years ago
- This repository provides a comprehensive Digital Footprint Checklist to help individuals manage their online presence and enhance privacy…☆17Dec 25, 2024Updated last year
- ☆42Sep 16, 2022Updated 3 years ago
- Config files for my GitHub profile.☆13Oct 9, 2022Updated 3 years ago
- An example Cloudformation template for the creation of an EKS compatible OpenID Connect provider☆14Jul 6, 2020Updated 5 years ago
- Short Python script for parsing Defender VDM signature files.☆10Sep 22, 2024Updated last year
- Script from the paper generating encrypted network. Dataset☆11Sep 1, 2021Updated 4 years ago
- Gomen is GoLang simple boilerplate for building Microservice architecture with multiple transport layer such as GRPC & Rest Api☆19Dec 25, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Solving the Flow-shop scheduling problem with bruteforce, johnson's, neh and simulated annealing algorithms☆11Nov 24, 2021Updated 4 years ago
- Analyst Tool to automate some of an analyst's daily investigation tasks. In both python script and Jupyter Notebook format.☆16Nov 24, 2025Updated 5 months ago
- YARA rule analyzer to improve rule quality and performance☆113Jan 18, 2026Updated 3 months ago
- Windows Shell Link (LNK) Proof of Concept☆16Jul 19, 2025Updated 9 months ago
- Security awareness base course☆17Oct 16, 2020Updated 5 years ago
- Public exploits☆16May 28, 2018Updated 7 years ago
- ☆53Feb 21, 2025Updated last year
- **SMon** adalah sistem monitoring jaringan canggih yang menggunakan protokol SNMP (Simple Network Management Protocol) untuk memantau per…☆56Dec 15, 2025Updated 4 months ago
- Tests your API automatically for common API vulnerabilities. Project is still Work In Progress. PRs are appreciated.☆33Apr 12, 2024Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Draugnet is a lightweight, open-source tool for anonymous cyber threat reporting. Built for the MISP ecosystem, it lets users submit and …☆20Mar 24, 2026Updated last month
- A CLI tool to download from HTTP/S for GNU/Weeb. Like wget, but can parallelize the download.☆22Dec 27, 2025Updated 4 months ago
- Command line client for HackTheBox☆25Feb 26, 2024Updated 2 years ago
- 🚀 Smallest event emitter for JavaScript with all the power of ES6 Maps!☆11Jul 25, 2019Updated 6 years ago
- Mail Header Detective is a powerful tool that can help dissect complex email headers, providing useful insights and valuable information …☆14May 5, 2024Updated last year
- ☆16Aug 10, 2025Updated 8 months ago
- ☆17Feb 3, 2023Updated 3 years ago