jakewarren / snort-rule-generatorView external linksLinks
Quickly generate snort rules for IOCs
☆18Oct 21, 2015Updated 10 years ago
Alternatives and similar repositories for snort-rule-generator
Users that are interested in snort-rule-generator are comparing it to the libraries listed below
Sorting:
- Yara rules I've written☆10Dec 9, 2015Updated 10 years ago
- AYY LMAO☆12Aug 27, 2015Updated 10 years ago
- Python script to pull various IOCs from PDFs☆15Dec 22, 2014Updated 11 years ago
- Snort Rules☆19Mar 9, 2016Updated 9 years ago
- This is a malware analysis project which expecte to generate snort rule via malicious network traffic☆28Apr 13, 2023Updated 2 years ago
- Just another tool to extract Indicator of compromise (ioc) from files☆29Oct 1, 2015Updated 10 years ago
- Web Interface Portal & Security Threat Engine for REMnux☆24Aug 1, 2016Updated 9 years ago
- cuckoo-1.1 fork with suricata/moloch/clamav and other goodies☆23Feb 17, 2015Updated 10 years ago
- YARA package for Sublime Text☆19Nov 30, 2025Updated 2 months ago
- zer0m0n driver for cuckoo sandbox☆24Feb 24, 2015Updated 10 years ago
- Export Maltego Graphs to JSON format☆21Nov 9, 2017Updated 8 years ago
- ☆18Apr 16, 2015Updated 10 years ago
- Snort rules to detect local malware, phishing, and adult content by inspecting DNS responses from OpenDNS☆52Sep 16, 2016Updated 9 years ago
- Platform for Browser Exploitation☆34Mar 1, 2015Updated 10 years ago
- WordPress Honeypot☆35Jan 18, 2018Updated 8 years ago
- Based on the Volatility framework, this script will run various plugins as well as create a timeline, or use YARA/ClamAV/VirusTotal to fi…☆49May 31, 2017Updated 8 years ago
- Cuckoo Sandbox Local Maltego Transforms Project☆49Jul 2, 2014Updated 11 years ago
- ☆10Mar 19, 2018Updated 7 years ago
- Wireshark dissector for GE-FANUC Service Request Transfer Protocol☆11Jan 7, 2023Updated 3 years ago
- Static Feature Extraction & Selection (used in conjunction with the MASTIFF framework)☆16Oct 19, 2016Updated 9 years ago
- ☆15Sep 7, 2025Updated 5 months ago
- A specialized implementation of the Hierarchical Navigable Small World (HNSW) data structure adapted for efficient nearest neighbor looku…☆10Jan 26, 2026Updated 2 weeks ago
- A friendly orchestrator platform from the future☆16Updated this week
- Live-Armor: Building Custom Linux Live Images for Security Sandboxing☆11Mar 25, 2015Updated 10 years ago
- A tool to generate Snort rules based on public IP reputation data☆56Aug 28, 2013Updated 12 years ago
- openioc_scan Volatility Framework plugin☆44Feb 25, 2016Updated 9 years ago
- Mailing Phishing Framework - This Branch is UNSTABLE :: Official STABLE master branch at https://github.com/Section9Labs/Cartero☆49Sep 3, 2017Updated 8 years ago
- Need to convert all your dev-speak into plain English? This might help.☆11Sep 6, 2021Updated 4 years ago
- WordPress Optimization Solutions☆10Mar 13, 2019Updated 6 years ago
- ☆14Oct 5, 2013Updated 12 years ago
- Bro scripts to monitor for new hosts within a subnet range that aren't whitelisted/vetted.☆13Jun 28, 2013Updated 12 years ago
- Custom rules for yara-integrated scans☆16Jun 5, 2013Updated 12 years ago
- Range Traffic Generator - Used to simulate browsing traffic on a range.☆11May 24, 2017Updated 8 years ago
- Scripts used to create ISO installers of ROCK for offline installation.☆10Mar 13, 2023Updated 2 years ago
- ☆11Mar 21, 2020Updated 5 years ago
- Repository for proxenet plugins☆14Jun 14, 2016Updated 9 years ago
- PowerShell functions, scripts and modules☆15Dec 11, 2016Updated 9 years ago
- Resources to Learn WebVR 😎☆12Jun 21, 2019Updated 6 years ago
- HTTPS Client for www.random.org, optional use of TOR proxy☆14Feb 2, 2014Updated 12 years ago