A tool to generate Snort rules based on public IP reputation data
☆56Aug 28, 2013Updated 12 years ago
Alternatives and similar repositories for IP-reputation-snort-rule-generator
Users that are interested in IP-reputation-snort-rule-generator are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This is a malware analysis project which expecte to generate snort rule via malicious network traffic☆28Apr 13, 2023Updated 2 years ago
- Impersonate Logged In Accounts & Execute Commands☆35Sep 2, 2014Updated 11 years ago
- Quickly generate snort rules for IOCs☆18Oct 21, 2015Updated 10 years ago
- A Python listener to capture Snort event via the UNIX Socket output.☆15Mar 30, 2017Updated 9 years ago
- Snort rules to detect local malware, phishing, and adult content by inspecting DNS responses from OpenDNS☆52Sep 16, 2016Updated 9 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Open-source decompilation of Disstrack☆12Oct 18, 2016Updated 9 years ago
- yara rules for cryptography detection☆31Apr 28, 2014Updated 11 years ago
- Check IOC provided by a MISP instance on Suricata events☆18Jun 4, 2019Updated 6 years ago
- 网站木马检测☆21Nov 12, 2014Updated 11 years ago
- Binary Analysis Platform -- I will try to keep this updated with patches, fixes, etc.☆33Oct 1, 2014Updated 11 years ago
- A dumb set of scripts for building a cuckoo rig☆61Feb 26, 2017Updated 9 years ago
- Snort Rules☆19Mar 9, 2016Updated 10 years ago
- A Python script that generates Snort IDS rules from network packets☆24Oct 30, 2017Updated 8 years ago
- Basic Anomaly IDS capabilities with Python and Bro☆105Feb 27, 2018Updated 8 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- an awesome list of honeypot resources☆10Jul 14, 2017Updated 8 years ago
- Mass Android app vulnerability analysis toolkit☆13Dec 6, 2016Updated 9 years ago
- Challenges from past S4 (SCADA Security Scientific Symposium) Capture-the-Flag contests.☆28Aug 19, 2016Updated 9 years ago
- Malware visualization on earth map☆41Jan 26, 2015Updated 11 years ago
- 🦅 Falcon Malware Sandbox APIv2 Connector☆31Mar 22, 2023Updated 3 years ago
- Yara is awesome, but sometimes you need to manipulate the data streams you're scanning in different ways.☆98Oct 21, 2014Updated 11 years ago
- Python bindings for ssdeep☆90Feb 6, 2022Updated 4 years ago
- Python tools for IOC (Indicator of Compromise) handling☆96Nov 25, 2021Updated 4 years ago
- Ponmocup Indicators of Compromise☆11Feb 4, 2016Updated 10 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- x86_64 linux rootkit using debug registers☆53Jan 11, 2022Updated 4 years ago
- PowerShell Module Bindings for Capstone/Keystone☆25Nov 15, 2016Updated 9 years ago
- Gobbling it's way through your pcap files☆24Oct 23, 2014Updated 11 years ago
- An automated way to send phishing emails from Google/G-suite.☆18Nov 30, 2018Updated 7 years ago
- Malice Yara Plugin☆29Sep 8, 2019Updated 6 years ago
- Bash script to Check for malicious Cryptomining☆38Aug 19, 2018Updated 7 years ago
- cuckoo sandbox patches and scripts☆15Jan 30, 2014Updated 12 years ago
- Generate CIA/NSA style project codenames☆22Sep 29, 2017Updated 8 years ago
- Bro IDS + ELK Stack to detect and block data exfiltration☆46Oct 31, 2018Updated 7 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Python based client for IBM XForce Exchange☆26Aug 5, 2016Updated 9 years ago
- IOC (Indicator of Compromise) Extractor: a program to help extract IOCs from text files.☆135Jan 14, 2016Updated 10 years ago
- ISR-sqlget It's a blind SQL injection tool developed in Perl.☆14Apr 26, 2013Updated 12 years ago
- ☆34Aug 5, 2015Updated 10 years ago
- ☆12Oct 12, 2013Updated 12 years ago
- A powershell script for cracking halfLMchall password hashes☆22Feb 5, 2013Updated 13 years ago
- ☆12Aug 22, 2017Updated 8 years ago