jasonish / suricata-trafficid.ARCHIVEDLinks
Application and service identification rules for Suricata
☆29Updated 2 years ago
Alternatives and similar repositories for suricata-trafficid.ARCHIVED
Users that are interested in suricata-trafficid.ARCHIVED are comparing it to the libraries listed below
Sorting:
- Useful resources for Zeek(https://zeek.org/) (Bro(http://bro.org/))☆31Updated 5 years ago
- suricata IDS的规则,测试在用的,部分自写的规则视情况放出。☆18Updated 6 years ago
- Rule sets for Sagan☆104Updated 4 years ago
- Snort rules☆35Updated 6 years ago
- Snort/Suricata DAQ module with DPDK patch☆11Updated last year
- ☆37Updated last year
- Quickly generate suricata rules for IOCs☆29Updated 4 years ago
- The python client of 360 Netlab whois database☆14Updated 6 years ago
- ☆35Updated last year
- Web service for scanning pcaps with snort☆109Updated 6 years ago
- Oops, It's funny to detect a webshell. Temporarily not maintained☆18Updated 7 years ago
- How to Zeek Sysmon Logs!☆101Updated 3 years ago
- Templates for Kibana/Logstash to use with Suricata IDPS☆80Updated 9 years ago
- 威胁检测规则集☆15Updated 5 years ago
- A set of zeek scripts providing a module for tracking and correlating abnormal DNS behavior.☆34Updated 4 months ago
- Meer (GPLv2) is a dedicated "spooler" for the Suricata & Sagan EVE output formats.☆23Updated 4 years ago
- ThreatHound is a threat intelligence query tool use for detecting potentially malicious IP or domains. It combines the MISP open source t…☆39Updated 5 years ago
- ☆9Updated 8 years ago
- passive dns collector☆10Updated 8 years ago
- A dsniff project using bro☆10Updated 9 years ago
- 一个HIDS agent端的demo☆17Updated 5 years ago
- ☆16Updated 7 years ago
- Scripts to detect Fast-Flux and DGA using DNS query responses☆43Updated 7 years ago
- Application and service identification rules for Suricata☆18Updated 2 years ago
- This is the C version of the StratosphereLinuxIPS. It is mainly used for integration with Snort and other IDSs.☆12Updated 8 years ago
- Plugin providing AF_XDP support for Bro.☆14Updated 4 years ago
- This is a malware analysis project which expecte to generate snort rule via malicious network traffic☆28Updated 2 years ago
- Passive DNS collection using Zeek☆182Updated last year
- add dpdk interface and packet processing to suricata in worker mode☆65Updated 4 years ago
- This is an open source Snort rules repository☆30Updated 3 years ago