A tool to generate Snort rules based on public IP reputation data
☆56Aug 28, 2013Updated 12 years ago
Alternatives and similar repositories for IP-reputation-snort-rule-generator
Users that are interested in IP-reputation-snort-rule-generator are comparing it to the libraries listed below
Sorting:
- This is a malware analysis project which expecte to generate snort rule via malicious network traffic☆28Apr 13, 2023Updated 2 years ago
- A Python listener to capture Snort event via the UNIX Socket output.☆15Mar 30, 2017Updated 8 years ago
- Snort rules to detect local malware, phishing, and adult content by inspecting DNS responses from OpenDNS☆52Sep 16, 2016Updated 9 years ago
- Meer (GPLv2) is a dedicated "spooler" for the Suricata & Sagan EVE output formats.☆23Feb 9, 2021Updated 5 years ago
- aka GENESIDS: Reads and parses rules using a "snort like" syntax and generates and sends packets that trigger events in signature based I…☆23Nov 9, 2018Updated 7 years ago
- Impersonate Logged In Accounts & Execute Commands☆35Sep 2, 2014Updated 11 years ago
- yara rules for cryptography detection☆31Apr 28, 2014Updated 11 years ago
- an awesome list of honeypot resources☆10Jul 14, 2017Updated 8 years ago
- cuckoo sandbox patches and scripts☆15Jan 30, 2014Updated 12 years ago
- A Python script that generates Snort IDS rules from network packets☆24Oct 30, 2017Updated 8 years ago
- A dumb set of scripts for building a cuckoo rig☆61Feb 26, 2017Updated 9 years ago
- Send events from G Suite to McAfee SIEM☆13Aug 23, 2019Updated 6 years ago
- A homebrewed cyber threat intelligence solution☆20Nov 20, 2012Updated 13 years ago
- Mass Android app vulnerability analysis toolkit☆13Dec 6, 2016Updated 9 years ago
- How to send structured Snort IDS alert logs into Graylog☆27Oct 20, 2025Updated 4 months ago
- Gobbling it's way through your pcap files☆24Oct 23, 2014Updated 11 years ago
- Binary Analysis Platform -- I will try to keep this updated with patches, fixes, etc.☆33Oct 1, 2014Updated 11 years ago
- A Tool for cross-platform System Enumeration☆12Mar 20, 2017Updated 8 years ago
- Wireless Forensics Framework In Python☆19Jan 29, 2017Updated 9 years ago
- Python libary to normalize Yara signatures☆19Oct 9, 2020Updated 5 years ago
- ☆15Nov 11, 2015Updated 10 years ago
- An automated way to send phishing emails from Google/G-suite.☆18Nov 30, 2018Updated 7 years ago
- Malware visualization on earth map☆41Jan 26, 2015Updated 11 years ago
- Basic Anomaly IDS capabilities with Python and Bro☆105Feb 27, 2018Updated 8 years ago
- Python bindings for ssdeep☆90Feb 6, 2022Updated 4 years ago
- Bash script to Check for malicious Cryptomining☆38Aug 19, 2018Updated 7 years ago
- Yara rules☆49Jan 28, 2014Updated 12 years ago
- SerialCanBus - A Ruby library for LAWICEL serial CAN bus adapters☆21Mar 16, 2022Updated 3 years ago
- Python OpenIOC Editor☆18Dec 28, 2015Updated 10 years ago
- Snort Rules☆19Mar 9, 2016Updated 10 years ago
- CAPE monitor DLLs☆42Dec 3, 2019Updated 6 years ago
- Check IOC provided by a MISP instance on Suricata events☆18Jun 4, 2019Updated 6 years ago
- Yara Scanner For IMAP Feeds and saved Streams☆28Nov 5, 2019Updated 6 years ago
- A modular Python application to pull intelligence about malicious files☆123Dec 4, 2020Updated 5 years ago
- GSAudit at Symantec, ExeAudit at RIM, RECX Binary Assurance for Windows at Recx etc. - core library now WinBinaryAudit☆24Jul 1, 2015Updated 10 years ago
- Hunting IOCs all day every day...☆88Sep 26, 2023Updated 2 years ago
- x86_64 linux rootkit using debug registers☆53Jan 11, 2022Updated 4 years ago
- Python tools for IOC (Indicator of Compromise) handling☆96Nov 25, 2021Updated 4 years ago
- ☆22Nov 18, 2015Updated 10 years ago