g-rd / snortparserLinks
Snort rule parser/validator written in python.
☆19Updated 2 years ago
Alternatives and similar repositories for snortparser
Users that are interested in snortparser are comparing it to the libraries listed below
Sorting:
- Download pcap files from http://www.malware-traffic-analysis.net/☆81Updated 7 years ago
- This repository will hold PCAP IOC data related with known malware samples (owner: Bryant Smith)☆108Updated 4 years ago
- Mapping NSM rules to MITRE ATT&CK☆72Updated 5 years ago
- Pure python parser for Snort/Suricata rules.☆33Updated last year
- Suricata Verification Tests - Testing Suricata Output☆115Updated last week
- ☆42Updated 3 years ago
- A set of ICS IDS rules for use with Suricata.☆50Updated 2 years ago
- ☆33Updated 7 years ago
- This is an open source Snort rules repository☆30Updated 3 years ago
- Explore Indicators of Compromise Automatically☆97Updated 5 years ago
- Malware Sinkhole List in various formats☆102Updated 3 years ago
- Suspicious DGA from PDNS and Sandbox.☆187Updated 3 years ago
- Suricata rules for network anomaly detection☆177Updated last month
- idstools: Snort and Suricata Rule and Event Utilities in Python (Including a Rule Update Tool)☆282Updated 4 months ago
- PcapMonkey will provide an easy way to analyze pcap using the latest version of Suricata and Zeek.☆159Updated 7 months ago
- High fidelity JA3 & JA3S combinations for known botnets and alike☆11Updated 6 years ago
- An easy ATT&CK-based Sysmon hunting tool, showing in Blackhat USA 2019 Arsenal☆203Updated 3 years ago
- Triconex TriStation utilities and tools☆79Updated 6 years ago
- Collection of various open-source an commercial rulesets for NIDS (especially for Suricata and Snort)☆29Updated 2 years ago
- Repository of yara rules☆49Updated 10 years ago
- ☆35Updated last year
- zeek-scripts☆45Updated 6 years ago
- Rule sets for Sagan☆105Updated 4 years ago
- This repository contains all public indicators identified by 401trg during the course of our investigations. It also includes relevant ya…☆122Updated 4 years ago
- Suricata rule and intel index☆33Updated 2 weeks ago
- go-atomicredteam is a Golang application to execute tests as defined in the atomics folder of Red Canary's Atomic Red Team project (https…☆49Updated 2 years ago
- Templates for Kibana/Logstash to use with Suricata IDPS☆81Updated 9 years ago
- pyJARM is a library for doing JARM fingerprinting using python☆50Updated 7 months ago
- How to Zeek Sysmon Logs!☆103Updated 3 years ago
- A proof of concept implementation of the Siemens S7 protocol analyser for the Bro IDS.☆16Updated 8 years ago