Quickly generate snort rules for IOCs
☆18Oct 21, 2015Updated 10 years ago
Alternatives and similar repositories for snort-rule-generator
Users that are interested in snort-rule-generator are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- AYY LMAO☆12Aug 27, 2015Updated 10 years ago
- Yara rules I've written☆10Dec 9, 2015Updated 10 years ago
- This is a malware analysis project which expecte to generate snort rule via malicious network traffic☆28Apr 13, 2023Updated 2 years ago
- Python script to pull various IOCs from PDFs☆15Dec 22, 2014Updated 11 years ago
- Snort Rules☆19Mar 9, 2016Updated 10 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A homebrewed cyber threat intelligence solution☆20Nov 20, 2012Updated 13 years ago
- Export Maltego Graphs to JSON format☆21Nov 9, 2017Updated 8 years ago
- ☆16May 9, 2016Updated 9 years ago
- Just another tool to extract Indicator of compromise (ioc) from files☆29Oct 1, 2015Updated 10 years ago
- Web Interface Portal & Security Threat Engine for REMnux☆24Aug 1, 2016Updated 9 years ago
- AYY LMAO☆22Mar 26, 2016Updated 10 years ago
- cuckoo-1.1 fork with suricata/moloch/clamav and other goodies☆23Feb 17, 2015Updated 11 years ago
- YARA package for Sublime Text☆19Nov 30, 2025Updated 3 months ago
- Snort rules to detect local malware, phishing, and adult content by inspecting DNS responses from OpenDNS☆52Sep 16, 2016Updated 9 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A tool to generate Snort rules based on public IP reputation data☆56Aug 28, 2013Updated 12 years ago
- ☆15Jun 17, 2016Updated 9 years ago
- zer0m0n driver for cuckoo sandbox☆24Feb 24, 2015Updated 11 years ago
- ☆13Aug 15, 2017Updated 8 years ago
- Platform for Browser Exploitation☆34Mar 1, 2015Updated 11 years ago
- ThreatTracker is a Python script designed to monitor and generate alerts on given sets of indicators of compromise (IOCs) indexed by a se…☆70Mar 9, 2015Updated 11 years ago
- ☆18Apr 16, 2015Updated 10 years ago
- Pi-hole Remote Code Execution authenticated Version >= 4.3.2☆11Aug 5, 2020Updated 5 years ago
- Based on the Volatility framework, this script will run various plugins as well as create a timeline, or use YARA/ClamAV/VirusTotal to fi…☆49May 31, 2017Updated 8 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Docker configs and build scripts.☆22Dec 21, 2014Updated 11 years ago
- Ruby Oracle Security Scanner☆16Jul 9, 2012Updated 13 years ago
- Zeek package to detect Zerologon☆11Nov 10, 2021Updated 4 years ago
- ☆10Dec 28, 2015Updated 10 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆12Aug 2, 2013Updated 12 years ago
- Static and automated/dynamic malware analysis☆47Sep 28, 2015Updated 10 years ago
- Indicator of Compromise Mapping Service☆12Apr 15, 2014Updated 11 years ago
- WordPress Honeypot☆35Jan 18, 2018Updated 8 years ago
- The docker image for nginx rtmp hls server.☆11Jan 6, 2021Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Unpack MIME attachments from a file and check them against virustotal.com☆44Mar 11, 2016Updated 10 years ago
- The LogParserPlus application, which uses Microsoft's Log Parser.☆12Jul 30, 2017Updated 8 years ago
- Windows login backdoor diagnostic tool☆11Apr 2, 2017Updated 8 years ago
- NDISPktScan is a plugin for the Volatility Framework. It parses the Ethernet packets stored by ndis.sys in Windows kernel space memory.☆12Oct 23, 2015Updated 10 years ago
- EasyCTF IV☆10Feb 21, 2018Updated 8 years ago
- Some yara rules and tools☆16Feb 12, 2014Updated 12 years ago
- Yara rules☆10Dec 10, 2019Updated 6 years ago