michalpurzynski / suricata-rulesLinks
Example Suricata rules implementing some of my detection tactics
☆22Updated 2 years ago
Alternatives and similar repositories for suricata-rules
Users that are interested in suricata-rules are comparing it to the libraries listed below
Sorting:
- THOR MITRE ATT&CK Framework Coverage☆25Updated 5 years ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Updated 5 years ago
- ansible role to setup MISP, Malware Information Sharing Platform & Threat Sharing☆54Updated this week
- ☆34Updated 4 years ago
- Workflows for Shuffle☆24Updated 3 years ago
- ☆28Updated 5 months ago
- Indices for courses in SANS' Network Security Operations curriculum☆16Updated 9 years ago
- A simple Docker container that serves the MITRE ATT&CK Navigator web app☆27Updated 2 years ago
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Updated 5 years ago
- Generic Signature Format for SIEM Systems☆14Updated 4 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago
- Security Onion Elastic Stack☆46Updated 4 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated last year
- ☆15Updated 6 years ago
- A python script to acquire multiple aws ec2 instances in a forensically sound-ish way☆38Updated 4 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Updated last year
- Sharing Threat Hunting runbooks☆25Updated 6 years ago
- Remote Desktop Client Fingerprint script for Zeek. Based off of https://github.com/0x4D31/fatt☆40Updated 2 years ago
- ☆30Updated 7 years ago
- Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.☆23Updated 9 years ago
- pollen - A command-line tool for interacting with TheHive☆36Updated 6 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- Threat hunting repo for my independent study on threat hunting with OSQuery☆27Updated 7 years ago
- Automatic detection engineering technical state compliance☆55Updated last year
- Docker Container to deploy Mitre Caldera Automated Adversary Emulation System☆26Updated 5 years ago
- ☆13Updated 6 years ago
- Create alerts in The Hive from your Graylog alerts, to be turned into Hive cases.☆45Updated 5 years ago
- A collection of notebooks built for defensive and offensive operations.☆77Updated 5 years ago
- Triage automation for suspect URLs☆13Updated 6 years ago
- Threat Hunting with ELK Workshop (InfoSecWorld 2017)☆65Updated 8 years ago