Snort is an open-source, free and lightweight network intrusion detection system (NIDS) software for Linux and Windows to detect emerging threats. This container is designed to run snort with standard configurations and forward logs to the DNIF Adapter (AD) over the http API.
☆26Apr 20, 2017Updated 8 years ago
Alternatives and similar repositories for docker-snort
Users that are interested in docker-snort are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Library for ripping through git repos to analyze the source code☆23Mar 30, 2020Updated 6 years ago
- A Helm chart that deploys a web app defined in docker-compose.yml to Kubernetes☆13Mar 28, 2018Updated 8 years ago
- Azure Deployment Templates for Mandiant Managed Huning☆12Jun 1, 2023Updated 2 years ago
- This directory contains random scripts from threat hunting or malware research☆11Feb 15, 2018Updated 8 years ago
- Community content for LogRhythm Axon. Includes Dashboards, searches, analytics rules, processing policies and more.☆10Jul 26, 2024Updated last year
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Redis tcp map for postfix☆12Jun 28, 2024Updated last year
- Some YARA rules i will add from time to time☆12May 31, 2019Updated 6 years ago
- Threat Network Detection in Online Social Networks☆10Jan 20, 2017Updated 9 years ago
- Converts Sigma detection rules to a Splunk alert configuration.☆12Jul 1, 2021Updated 4 years ago
- Explains how to setup a omnibus full gitlab-ce (git, registry, pages) with HTTPS and Let's Encrypt certificates☆10Jan 4, 2022Updated 4 years ago
- it's a simple LKM rootkit.☆12Aug 2, 2016Updated 9 years ago
- Simple Tab Sorter++☆16May 28, 2025Updated 10 months ago
- Produces a suitable .gitlab-ci.yml file from a Golang TXT Template to work as input for a parent/child triggered GitLab CICD pipeline.☆11Updated this week
- Evil maid attacks are the biggest threat to full disk encryption, if you can't provide 100% physical security. It's not about locking you…☆11Sep 4, 2016Updated 9 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- SIEM USE Case Selection Methodology☆17Sep 18, 2020Updated 5 years ago
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆18Feb 9, 2024Updated 2 years ago
- ☆14Aug 21, 2022Updated 3 years ago
- Mail new tasks to your TaskWarrior inbox☆17Apr 30, 2021Updated 4 years ago
- Proof of concept incident response demo using SSM and AWS Fargate.☆14Dec 5, 2019Updated 6 years ago
- VSTS Pipeline demonstrating Terraform and Ansible☆11May 28, 2018Updated 7 years ago
- This repository contains advanced threat hunting scripts for Cisco Secure Endpoint API. The scripts leverage the AMP API to hunt for thre…☆14Jun 28, 2025Updated 9 months ago
- PowerShell module to automate via XMLRPC a remote Metasploit server.☆15May 30, 2014Updated 11 years ago
- Puppet setup to install my own workstation☆13Mar 30, 2026Updated 2 weeks ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- HTTParty over the StackOverflow API☆20Mar 1, 2013Updated 13 years ago
- ☆11Feb 14, 2025Updated last year
- Custom roster formatter tool for Warhammer 40000 games: https://40001format.xyz☆10Feb 5, 2025Updated last year
- Docker Compose Prometheus with a Grafana UI☆10Apr 25, 2017Updated 8 years ago
- Wife approved HomeOps driven by Kubernetes and GitOps using ArgoCD☆13Apr 1, 2026Updated 2 weeks ago
- 威胁检测规则集☆15Jul 5, 2019Updated 6 years ago
- just a basic rootkit for learning how to playing sys_call_table☆16Sep 12, 2016Updated 9 years ago
- A hands-on workshop to learn how to do threat detection and response in AWS.☆11Sep 13, 2021Updated 4 years ago
- A collection of awesome penetration testing resources, tools and other shiny things☆12Oct 10, 2017Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Cloudflare Durable Objects state adapter for Chat SDK☆45Mar 31, 2026Updated 2 weeks ago
- Microsoft 365 Defender Hunting via PowerShell.☆14Feb 8, 2022Updated 4 years ago
- ☆11Jul 17, 2022Updated 3 years ago
- Prometheus SELinux policy module for CentOS 7 & RHEL 7☆11Mar 8, 2019Updated 7 years ago
- Detect bots/crawlers/spiders via user-agent string☆13Feb 22, 2026Updated last month
- Parser to create unit cards for killteam/40k/horus heresy/AoS☆12Feb 2, 2026Updated 2 months ago
- MalwareAnalysis☆12Dec 19, 2020Updated 5 years ago