m-chrome / py-suricataparser
Pure python parser for Snort/Suricata rules.
☆29Updated 11 months ago
Alternatives and similar repositories for py-suricataparser:
Users that are interested in py-suricataparser are comparing it to the libraries listed below
- Collection of various open-source an commercial rulesets for NIDS (especially for Suricata and Snort)☆23Updated last year
- Suricata rule and intel index☆31Updated 2 months ago
- Suricata Verification Tests - Testing Suricata Output☆104Updated this week
- The project will serve as a central repository for VMware Threat Analysis Unit (TAU) to share threat intelligence with the security commu…☆17Updated last year
- This repository contains generated contextual data utilized by pyattck.☆19Updated 7 months ago
- Mapping NSM rules to MITRE ATT&CK☆69Updated 4 years ago
- Suricata Language Server is an implementation of the Language Server Protocol for Suricata signatures. It adds syntax check, hints and au…☆68Updated last month
- DGA Detective - Hunt domains generated by Domain Generation Algorithms to identify malware traffic☆40Updated 7 months ago
- pyJARM is a library for doing JARM fingerprinting using python☆51Updated last month
- zeek-scripts☆43Updated 6 years ago
- This repository has been archived in favor of https://github.com/idaholab/Malcolm-Test-Artifacts☆33Updated 2 months ago
- Useful resources for Zeek(https://zeek.org/) (Bro(http://bro.org/))☆32Updated 4 years ago
- A library and command line tool for extracting indicators of compromise (IOCs) from security reports in PDF, HTML, Word, or text format☆30Updated last month
- ssdeep cluster analysis for malware files☆31Updated 4 years ago
- A map displaying threat actors from the misp-galaxy☆32Updated 2 years ago
- Code for BH21 talk: "Generating YARA Rules by Classifying Malicious Byte Sequences"☆17Updated 3 weeks ago
- All necessary code in order to feed Sysmon data into Recurrent Neural Network☆17Updated 4 years ago
- Create dataset for suricata with indicators of MISP instances and add sightings in MISP if an indicator of dataset generates an alert☆37Updated 2 years ago
- This repository will hold PCAP IOC data related with known malware samples (owner: Bryant Smith)☆100Updated 3 years ago
- The Security Analyst’s Guide to Suricata☆54Updated 9 months ago
- Parse Suricata rules☆13Updated last year
- Look into EDR events from network☆23Updated 10 months ago
- Threat Mapping Catalogue☆17Updated 3 years ago
- ☆41Updated 2 years ago
- ☆39Updated 2 years ago
- Tracking APT IOCs☆25Updated 4 years ago
- Analysis of file (doc, pdf, exe, ...) in deep (emmbedded file(s)) with clamscan and yara rules☆50Updated last year
- Remote Desktop Client Fingerprint script for Zeek. Based off of https://github.com/0x4D31/fatt☆39Updated last year
- ☆13Updated 5 months ago
- A collection of my public YARA signatures for various malware families☆29Updated 5 months ago