Quickly generate snort rules for IOCs
☆18Oct 21, 2015Updated 10 years ago
Alternatives and similar repositories for snort-rule-generator
Users that are interested in snort-rule-generator are comparing it to the libraries listed below
Sorting:
- AYY LMAO☆12Aug 27, 2015Updated 10 years ago
- Yara rules I've written☆10Dec 9, 2015Updated 10 years ago
- Python script to pull various IOCs from PDFs☆15Dec 22, 2014Updated 11 years ago
- Snort Rules☆19Mar 9, 2016Updated 9 years ago
- This is a malware analysis project which expecte to generate snort rule via malicious network traffic☆28Apr 13, 2023Updated 2 years ago
- A homebrewed cyber threat intelligence solution☆20Nov 20, 2012Updated 13 years ago
- Just another tool to extract Indicator of compromise (ioc) from files☆29Oct 1, 2015Updated 10 years ago
- Web Interface Portal & Security Threat Engine for REMnux☆24Aug 1, 2016Updated 9 years ago
- cuckoo-1.1 fork with suricata/moloch/clamav and other goodies☆23Feb 17, 2015Updated 11 years ago
- YARA package for Sublime Text☆19Nov 30, 2025Updated 3 months ago
- AYY LMAO☆22Mar 26, 2016Updated 9 years ago
- ☆18Apr 16, 2015Updated 10 years ago
- Export Maltego Graphs to JSON format☆21Nov 9, 2017Updated 8 years ago
- Platform for Browser Exploitation☆34Mar 1, 2015Updated 11 years ago
- ThreatTracker is a Python script designed to monitor and generate alerts on given sets of indicators of compromise (IOCs) indexed by a se…☆70Mar 9, 2015Updated 10 years ago
- Python / Scapy tool to analyze and interact with IEC 61850 Goose traffic☆37Dec 15, 2021Updated 4 years ago
- WordPress Honeypot☆35Jan 18, 2018Updated 8 years ago
- Cuckoo Sandbox Local Maltego Transforms Project☆49Jul 2, 2014Updated 11 years ago
- A project to help share common scripts in the PowerActions web client fling☆10Jul 26, 2015Updated 10 years ago
- A specialized implementation of the Hierarchical Navigable Small World (HNSW) data structure adapted for efficient nearest neighbor looku…☆10Updated this week
- Wireshark dissector for GE-FANUC Service Request Transfer Protocol☆11Jan 7, 2023Updated 3 years ago
- Live-Armor: Building Custom Linux Live Images for Security Sandboxing☆11Mar 25, 2015Updated 10 years ago
- ☆15Sep 7, 2025Updated 6 months ago
- A friendly orchestrator platform from the future☆17Feb 27, 2026Updated last week
- Static Feature Extraction & Selection (used in conjunction with the MASTIFF framework)☆16Oct 19, 2016Updated 9 years ago
- A tool to generate Snort rules based on public IP reputation data☆56Aug 28, 2013Updated 12 years ago
- Mailing Phishing Framework - This Branch is UNSTABLE :: Official STABLE master branch at https://github.com/Section9Labs/Cartero☆49Sep 3, 2017Updated 8 years ago
- ☆10May 30, 2015Updated 10 years ago
- ☆14Dec 5, 2014Updated 11 years ago
- The LogParserPlus application, which uses Microsoft's Log Parser.☆12Jul 30, 2017Updated 8 years ago
- Implementation of distributed and parallel databases operations like fragmentation, parallel sort, range query etc.☆10Nov 2, 2017Updated 8 years ago
- ☆14Oct 5, 2013Updated 12 years ago
- Need to convert all your dev-speak into plain English? This might help.☆11Sep 6, 2021Updated 4 years ago
- CLI generator for Velociraptor offline collector☆16Oct 10, 2025Updated 4 months ago
- ☆12May 1, 2023Updated 2 years ago
- Solving Puzzles with Python - tutorial at PyCon India 2012☆18Oct 5, 2012Updated 13 years ago
- Script for system monitoring☆13Nov 30, 2012Updated 13 years ago
- YARA duplicate rule detection and removal. YARA rule index creation. YARA rule file merger.☆10Jan 19, 2026Updated last month
- Tools for use with phishing frenzy☆11Jan 17, 2019Updated 7 years ago