A tool to generate Snort rules based on public IP reputation data
☆56Aug 28, 2013Updated 12 years ago
Alternatives and similar repositories for IP-reputation-snort-rule-generator
Users that are interested in IP-reputation-snort-rule-generator are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Meer (GPLv2) is a dedicated "spooler" for the Suricata & Sagan EVE output formats.☆23Feb 9, 2021Updated 5 years ago
- Impersonate Logged In Accounts & Execute Commands☆35Sep 2, 2014Updated 11 years ago
- Quickly generate snort rules for IOCs☆18Oct 21, 2015Updated 10 years ago
- aka GENESIDS: Reads and parses rules using a "snort like" syntax and generates and sends packets that trigger events in signature based I…☆23Nov 9, 2018Updated 7 years ago
- A Python listener to capture Snort event via the UNIX Socket output.☆15Mar 30, 2017Updated 9 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Snort rules to detect local malware, phishing, and adult content by inspecting DNS responses from OpenDNS☆52Sep 16, 2016Updated 9 years ago
- A homebrewed cyber threat intelligence solution☆20Nov 20, 2012Updated 13 years ago
- yara rules for cryptography detection☆31Apr 28, 2014Updated 11 years ago
- Check IOC provided by a MISP instance on Suricata events☆18Jun 4, 2019Updated 6 years ago
- 网站木马检测☆21Nov 12, 2014Updated 11 years ago
- Binary Analysis Platform -- I will try to keep this updated with patches, fixes, etc.☆33Oct 1, 2014Updated 11 years ago
- A dumb set of scripts for building a cuckoo rig☆61Feb 26, 2017Updated 9 years ago
- Snort Rules☆19Mar 9, 2016Updated 10 years ago
- Basic Anomaly IDS capabilities with Python and Bro☆105Feb 27, 2018Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- an awesome list of honeypot resources☆10Jul 14, 2017Updated 8 years ago
- ☆15Nov 11, 2015Updated 10 years ago
- Challenges from past S4 (SCADA Security Scientific Symposium) Capture-the-Flag contests.☆28Aug 19, 2016Updated 9 years ago
- Malware visualization on earth map☆41Jan 26, 2015Updated 11 years ago
- 🦅 Falcon Malware Sandbox APIv2 Connector☆31Mar 22, 2023Updated 3 years ago
- Yara is awesome, but sometimes you need to manipulate the data streams you're scanning in different ways.☆98Oct 21, 2014Updated 11 years ago
- Python bindings for ssdeep☆90Feb 6, 2022Updated 4 years ago
- Python tools for IOC (Indicator of Compromise) handling☆96Nov 25, 2021Updated 4 years ago
- Ponmocup Indicators of Compromise☆11Feb 4, 2016Updated 10 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- x86_64 linux rootkit using debug registers☆53Jan 11, 2022Updated 4 years ago
- PowerShell Module Bindings for Capstone/Keystone☆25Nov 15, 2016Updated 9 years ago
- Gobbling it's way through your pcap files☆24Oct 23, 2014Updated 11 years ago
- An automated way to send phishing emails from Google/G-suite.☆18Nov 30, 2018Updated 7 years ago
- Malice Yara Plugin☆29Sep 8, 2019Updated 6 years ago
- cuckoo sandbox patches and scripts☆15Jan 30, 2014Updated 12 years ago
- Bro IDS + ELK Stack to detect and block data exfiltration☆46Oct 31, 2018Updated 7 years ago
- Python based client for IBM XForce Exchange☆26Aug 5, 2016Updated 9 years ago
- IOC (Indicator of Compromise) Extractor: a program to help extract IOCs from text files.☆135Jan 14, 2016Updated 10 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ISR-sqlget It's a blind SQL injection tool developed in Perl.☆14Apr 26, 2013Updated 12 years ago
- ☆34Aug 5, 2015Updated 10 years ago
- ☆12Oct 12, 2013Updated 12 years ago
- A powershell script for cracking halfLMchall password hashes☆22Feb 5, 2013Updated 13 years ago
- A simple Nessus results viewer☆50Aug 30, 2013Updated 12 years ago
- ☆12Aug 22, 2017Updated 8 years ago
- Send events from G Suite to McAfee SIEM☆13Aug 23, 2019Updated 6 years ago