Collection of various open-source an commercial rulesets for NIDS (especially for Suricata and Snort)
☆29Jul 24, 2023Updated 2 years ago
Alternatives and similar repositories for nids-rule-library
Users that are interested in nids-rule-library are comparing it to the libraries listed below
Sorting:
- A tools to work on suricata stats.log file.☆29Oct 14, 2015Updated 10 years ago
- ☆17Feb 21, 2025Updated last year
- ☆18Jan 12, 2025Updated last year
- A curated list of awesome things related to Suricata☆221Nov 21, 2025Updated 3 months ago
- A collection of pcaps☆16Jul 5, 2015Updated 10 years ago
- The Security Analyst’s Guide to Suricata☆61Apr 28, 2025Updated 10 months ago
- Python libary to normalize Yara signatures☆19Oct 9, 2020Updated 5 years ago
- Pure python parser for Snort/Suricata rules.☆34Mar 13, 2024Updated last year
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Apr 10, 2020Updated 5 years ago
- DHCP fingerprints database and related tools☆19Nov 14, 2014Updated 11 years ago
- suricata IDS的规则,测试在用的,部分自写的规则视情况放出。☆18Apr 16, 2019Updated 6 years ago
- Statistics parsing for suricata☆18Nov 14, 2013Updated 12 years ago
- Tranalyzer generates extended netflow-like flow statistics from large pcap files or extensive ethernet interface measurements. It is inte…☆18Nov 14, 2018Updated 7 years ago
- A network packet synthesis language☆22Updated this week
- Using nDPI/openDPI to detect flow protocols from a PCAP file or live NIC. This program was modified from example in nDPI and I added a pe…☆23May 6, 2016Updated 9 years ago
- 快速获取图片的GPS和其拍摄地理位置☆20Feb 17, 2019Updated 7 years ago
- gonids is a library to parse IDS rules, with a focus primarily on Suricata rule compatibility. There is a discussion forum available that…☆192Jul 18, 2025Updated 7 months ago
- The tool for updating your Suricata rules.☆293Oct 31, 2025Updated 4 months ago
- Accurate, modular, scalable PCAP manipulation tool written in Go.☆96Apr 30, 2024Updated last year
- in https://funoverip.net/2011/03/cd00r-knocking-backdoor-improved/☆25Jul 16, 2015Updated 10 years ago
- Decentralized Cyber Threat Intelligence Kaizen Framework☆27Jan 31, 2022Updated 4 years ago
- Network visualizer tool built using Processing☆24Jun 23, 2021Updated 4 years ago
- Packet captures of malicious traffic for analysis using Wireshark☆64Jul 10, 2023Updated 2 years ago
- CyCAT.org API back-end server including crawlers☆29Feb 4, 2023Updated 3 years ago
- Quickly generate suricata rules for IOCs☆28Apr 30, 2021Updated 4 years ago
- A collection of Indicators of Compromise (IoCs), most aligning with samples derived from the signatures in the YARA-Signatures repo☆29Jun 11, 2020Updated 5 years ago
- 安卓远控,天线6.0 无限使用版☆11Sep 9, 2023Updated 2 years ago
- ☆10Apr 20, 2022Updated 3 years ago
- The "Let's-defend-solution" directory contains the answers to all paths of the Let's Defend platform that were saved by the creator 8 mon…☆12Apr 27, 2023Updated 2 years ago
- ☆38Nov 2, 2024Updated last year
- A repository for a Deep Q-Learning approach to intrusion detection for networks cyber-attacks.☆10Sep 3, 2021Updated 4 years ago
- SPPNet: An Appoach For Real-Time Encrypted Traffic Classification Using Deep Learning☆10Aug 6, 2024Updated last year
- Yara powered NIDS with high speed packet capture powered by PF_RING☆69May 11, 2024Updated last year
- Suricata, Snort and Zeek IDS rule and pcap testing system☆511Updated this week
- a network packet capture compiler☆205Apr 28, 2022Updated 3 years ago
- A fingerprint generation helper for nuclei network templates☆80Nov 20, 2022Updated 3 years ago
- intelligence-icons is a collection of icons and diagrams for building training and marketing materials around Intelligence sharing; inclu…☆41Mar 17, 2019Updated 6 years ago
- ☆38Nov 20, 2025Updated 3 months ago
- Suricata Language Server is an implementation of the Language Server Protocol for Suricata signatures. It adds syntax check, hints and au…☆86Updated this week