dnlongen / Snort-DNSView external linksLinks
Snort rules to detect local malware, phishing, and adult content by inspecting DNS responses from OpenDNS
☆52Sep 16, 2016Updated 9 years ago
Alternatives and similar repositories for Snort-DNS
Users that are interested in Snort-DNS are comparing it to the libraries listed below
Sorting:
- How to send structured Snort IDS alert logs into Graylog☆27Oct 20, 2025Updated 3 months ago
- A tool to generate Snort rules based on public IP reputation data☆56Aug 28, 2013Updated 12 years ago
- Quickly generate snort rules for IOCs☆18Oct 21, 2015Updated 10 years ago
- Snort Rules☆19Mar 9, 2016Updated 9 years ago
- ActionScript3 dynamic instrumentation tool☆36Mar 15, 2017Updated 8 years ago
- Metadata Inspection Database Alerting System☆42Jul 26, 2013Updated 12 years ago
- A curated lust of awesome cyber civil society actors, project etc.☆10Jul 16, 2020Updated 5 years ago
- Minimal web frontend for esniper, a lightweight eBay sniping tool☆10Dec 16, 2018Updated 7 years ago
- Search a domain on VirusTotal to identify if any known malware samples have ever attempted to communicate with it☆10Jan 25, 2016Updated 10 years ago
- cuckoo sandbox patches and scripts☆15Jan 30, 2014Updated 12 years ago
- Ruby Oracle Security Scanner☆16Jul 9, 2012Updated 13 years ago
- Yara rules I've written☆10Dec 9, 2015Updated 10 years ago
- Yara rules☆10Dec 10, 2019Updated 6 years ago
- Static and automated/dynamic malware analysis☆47Sep 28, 2015Updated 10 years ago
- Snort_rules detection bad actors.☆29Aug 18, 2024Updated last year
- IOC (Indicator of Compromise) Extractor: a program to help extract IOCs from text files.☆134Jan 14, 2016Updated 10 years ago
- Reworked assets for Azure Sentinel using Cisco Umbrella logs as source. Includes logstash config for Cisco Umbrella using Cisco managed A…☆13Apr 14, 2020Updated 5 years ago
- Docker projects to retain beacon source IPs using C2 relaying infra☆11Feb 25, 2019Updated 6 years ago
- Some yara rules and tools☆16Feb 12, 2014Updated 12 years ago
- Yara filetype plugin for Vim.☆14Feb 18, 2021Updated 4 years ago
- Gobbling it's way through your pcap files☆24Oct 23, 2014Updated 11 years ago
- A Tool for cross-platform System Enumeration☆12Mar 20, 2017Updated 8 years ago
- A central place for me to share interesting PSRemoting configurations☆16Jun 28, 2017Updated 8 years ago
- Bolster NEO API - Artificial intelligence based zero-hour phishing detection☆13Aug 10, 2021Updated 4 years ago
- Automated IOC-Generation scripts and tools☆24Sep 14, 2016Updated 9 years ago
- Python script to pull various IOCs from PDFs☆15Dec 22, 2014Updated 11 years ago
- A tool to generate yara signatures from function blocks☆19Dec 8, 2014Updated 11 years ago
- An ICAP Server with yara scanner for URL and content.☆58Dec 19, 2024Updated last year
- Python libary to normalize Yara signatures☆19Oct 9, 2020Updated 5 years ago
- Portable utility to check if a machine has been infected by Shamoon2☆15Jan 13, 2017Updated 9 years ago
- WebApp Honeypot for detecting Shell Shock exploit attempts☆55Jun 3, 2022Updated 3 years ago
- A Python listener to capture Snort event via the UNIX Socket output.☆15Mar 30, 2017Updated 8 years ago
- An automated way to send phishing emails from Google/G-suite.☆18Nov 30, 2018Updated 7 years ago
- A virtual PDF analysis framework☆17Jan 31, 2014Updated 12 years ago
- SaltStack formula for deploying Cuckoo Sandbox☆14Nov 27, 2018Updated 7 years ago
- ☆68Jun 21, 2017Updated 8 years ago
- JavaScript Reversed TCP Meterpreter Stager☆138May 25, 2017Updated 8 years ago
- Malware analysis tool☆22Apr 27, 2025Updated 9 months ago
- dns logger for passive dns collection☆42May 27, 2012Updated 13 years ago