Quickly generate suricata rules for IOCs
☆28Apr 30, 2021Updated 4 years ago
Alternatives and similar repositories for suricata-rule-generator
Users that are interested in suricata-rule-generator are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Example Suricata rules implementing some of my detection tactics☆22Jan 13, 2023Updated 3 years ago
- Suricata LUA scripts to detect CVE-2019-12255, CVE-2019-12256, CVE-2019-12258, and CVE-2019-12260☆19Nov 28, 2019Updated 6 years ago
- suricata rules to pcap☆10Mar 25, 2021Updated 5 years ago
- ☆35Dec 9, 2023Updated 2 years ago
- Mass Suricata rules creator, from a list of domain☆14Sep 14, 2018Updated 7 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Suricata rules for the new critical vulnerabilities☆85Jan 26, 2021Updated 5 years ago
- Suricata rules for network anomaly detection☆183Feb 7, 2026Updated last month
- The OTX Suricata Rule Generator can be used to create the rules and configuration for Suricata to alert on indicators from your OTX accou…☆116Apr 26, 2024Updated last year
- A Yara Lua output script for Suricata☆20Apr 7, 2019Updated 6 years ago
- A few snippets to show how suricata stats can end up in Influx DB using logstash☆12Jul 11, 2016Updated 9 years ago
- Suricata Language Server is an implementation of the Language Server Protocol for Suricata signatures. It adds syntax check, hints and au…☆86Mar 19, 2026Updated last week
- Collection of Suricata rule sets that I use modified to my environments.☆39Sep 13, 2020Updated 5 years ago
- A collection of Python utilities for use in scripts related to working with "indicators of compromise" (IOCs).☆16Dec 19, 2018Updated 7 years ago
- ☆38Nov 20, 2025Updated 4 months ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- YARA, SIGMA, SNORT Rules based on Malware Analysis☆17Apr 23, 2025Updated 11 months ago
- CGNAT em dispositivos baseados em RouterOS☆12May 14, 2019Updated 6 years ago
- Use your Mikrotik firewall to do fail2ban like blocking of unwanted IPs. Written in Go☆27Feb 23, 2026Updated last month
- A Go(lang) IDS rule parser☆13Jun 10, 2019Updated 6 years ago
- Suricata Verification Tests - Testing Suricata Output☆118Updated this week
- A simple way of detecting multithreaded exfiltration in Zeek.☆15May 1, 2025Updated 10 months ago
- Suricata rule and intel index☆33Mar 17, 2026Updated last week
- Attempting to decode the mysterious /r/A858DE45F56D9BC9 subreddit data☆11Jun 11, 2015Updated 10 years ago
- suricata IDS的规则,测试在用的,部分自写的规则视情况放出。☆18Apr 16, 2019Updated 6 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Sep 17, 2019Updated 6 years ago
- Application and service identification rules for Suricata☆19Nov 7, 2022Updated 3 years ago
- Configuring the Suricata IDS to detect DoS attacks by adding custom rule file.☆42May 8, 2020Updated 5 years ago
- This is a threat intelligence automatic crawling tool that also contains some high-value threat intelligence.☆21Jun 2, 2021Updated 4 years ago
- Kibana 7 Templates for Suricata IDPS Threat Hunting☆43Dec 23, 2025Updated 3 months ago
- A proof of concept of JA3 tracking.☆29Dec 31, 2018Updated 7 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Apr 18, 2020Updated 5 years ago
- RouterOS (Mikrotik) Backup over SSH☆19Feb 17, 2014Updated 12 years ago
- Mikrotik bot telegram, http://mikbotam.github.io☆14Apr 2, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Vulnerability Assessment Module - OpenVas with Elastic stack using VulnWhisperer☆20Jun 11, 2019Updated 6 years ago
- Community-based CybergON-powered Suricata rules☆12Jul 5, 2022Updated 3 years ago
- Mikrotik script which detects DDoS attacks☆12Feb 27, 2016Updated 10 years ago
- Mikrotik, Bot Telegram☆15Jul 11, 2019Updated 6 years ago
- A simple Mikrotik traffic counter script with web interface☆19Jan 6, 2015Updated 11 years ago
- ☆12Jan 28, 2020Updated 6 years ago
- IPS Suricata2MikroTik -CE- is a module for Suricata to read eve.json file and search specifics alert to block the source. This connect to…☆33Feb 3, 2023Updated 3 years ago