nccgroup / IP-reputation-snort-rule-generatorView external linksLinks
A tool to generate Snort rules based on public IP reputation data
☆56Aug 28, 2013Updated 12 years ago
Alternatives and similar repositories for IP-reputation-snort-rule-generator
Users that are interested in IP-reputation-snort-rule-generator are comparing it to the libraries listed below
Sorting:
- This is a malware analysis project which expecte to generate snort rule via malicious network traffic☆28Apr 13, 2023Updated 2 years ago
- A Python listener to capture Snort event via the UNIX Socket output.☆15Mar 30, 2017Updated 8 years ago
- Snort rules to detect local malware, phishing, and adult content by inspecting DNS responses from OpenDNS☆52Sep 16, 2016Updated 9 years ago
- Meer (GPLv2) is a dedicated "spooler" for the Suricata & Sagan EVE output formats.☆23Feb 9, 2021Updated 5 years ago
- aka GENESIDS: Reads and parses rules using a "snort like" syntax and generates and sends packets that trigger events in signature based I…☆22Nov 9, 2018Updated 7 years ago
- Impersonate Logged In Accounts & Execute Commands☆35Sep 2, 2014Updated 11 years ago
- yara rules for cryptography detection☆30Apr 28, 2014Updated 11 years ago
- cuckoo sandbox patches and scripts☆15Jan 30, 2014Updated 12 years ago
- A Python script that generates Snort IDS rules from network packets☆25Oct 30, 2017Updated 8 years ago
- A dumb set of scripts for building a cuckoo rig☆61Feb 26, 2017Updated 8 years ago
- Send events from G Suite to McAfee SIEM☆13Aug 23, 2019Updated 6 years ago
- Mass Android app vulnerability analysis toolkit☆13Dec 6, 2016Updated 9 years ago
- A homebrewed cyber threat intelligence solution☆20Nov 20, 2012Updated 13 years ago
- How to send structured Snort IDS alert logs into Graylog☆27Oct 20, 2025Updated 3 months ago
- A Tool for cross-platform System Enumeration☆12Mar 20, 2017Updated 8 years ago
- Binary Analysis Platform -- I will try to keep this updated with patches, fixes, etc.☆33Oct 1, 2014Updated 11 years ago
- ☆15Nov 11, 2015Updated 10 years ago
- Python libary to normalize Yara signatures☆19Oct 9, 2020Updated 5 years ago
- Wireless Forensics Framework In Python☆19Jan 29, 2017Updated 9 years ago
- An automated way to send phishing emails from Google/G-suite.☆18Nov 30, 2018Updated 7 years ago
- Basic Anomaly IDS capabilities with Python and Bro☆105Feb 27, 2018Updated 7 years ago
- Python bindings for ssdeep☆90Feb 6, 2022Updated 4 years ago
- Bash script to Check for malicious Cryptomining☆38Aug 19, 2018Updated 7 years ago
- Yara rules☆49Jan 28, 2014Updated 12 years ago
- Quickly generate snort rules for IOCs☆18Oct 21, 2015Updated 10 years ago
- Snort Rules☆19Mar 9, 2016Updated 9 years ago
- Python OpenIOC Editor☆18Dec 28, 2015Updated 10 years ago
- CAPE monitor DLLs☆41Dec 3, 2019Updated 6 years ago
- Yara Scanner For IMAP Feeds and saved Streams☆28Nov 5, 2019Updated 6 years ago
- Check IOC provided by a MISP instance on Suricata events☆18Jun 4, 2019Updated 6 years ago
- A modular Python application to pull intelligence about malicious files☆123Dec 4, 2020Updated 5 years ago
- Snort IDS/IPS log analytics using the Elastic Stack.☆87Jul 28, 2021Updated 4 years ago
- GSAudit at Symantec, ExeAudit at RIM, RECX Binary Assurance for Windows at Recx etc. - core library now WinBinaryAudit☆24Jul 1, 2015Updated 10 years ago
- Hunting IOCs all day every day...☆87Sep 26, 2023Updated 2 years ago
- x86_64 linux rootkit using debug registers☆53Jan 11, 2022Updated 4 years ago
- ☆22Nov 18, 2015Updated 10 years ago
- Python tools for IOC (Indicator of Compromise) handling☆96Nov 25, 2021Updated 4 years ago
- 🦅 Falcon Malware Sandbox APIv2 Connector☆30Mar 22, 2023Updated 2 years ago
- FTester - firewall and IDS testing tool [historical]☆24Aug 2, 2017Updated 8 years ago