onsoim / suricata2pcapLinks
suricata rules to pcap
☆10Updated 4 years ago
Alternatives and similar repositories for suricata2pcap
Users that are interested in suricata2pcap are comparing it to the libraries listed below
Sorting:
- Quickly generate suricata rules for IOCs☆28Updated 4 years ago
- 威胁检测规则集☆15Updated 6 years ago
- 《横向移动攻击与检测技术》专栏文章☆17Updated 6 years ago
- Suricata LUA scripts to detect CVE-2019-12255, CVE-2019-12256, CVE-2019-12258, and CVE-2019-12260☆19Updated 5 years ago
- ATT&CK技战术数据☆16Updated 4 years ago
- 黑客画像构建以及威胁事件的预测,通过搜集各大黑客技术论坛的聊天记录,绘制任务的拓扑图,以及技能雷达图。同时进一步预测监控攻击事件的发生以及溯源☆21Updated 6 years ago
- ☆58Updated last year
- ☆39Updated last year
- Suricata rules for the new critical vulnerabilities☆83Updated 4 years ago
- High fidelity JA3 & JA3S combinations for known botnets and alike☆11Updated 6 years ago
- suricata IDS的规则,测试在用的,部分自写的规则视情况放出。☆18Updated 6 years ago
- Simple web shell scanner written in Golang.☆89Updated 6 years ago
- Python nbtstat + smb_version without third party packages☆30Updated 4 years ago
- ☆31Updated last year
- Sentinel Guard - Use to build up Honeypot and Honeynet with ZERO cost easily and simply.☆18Updated 4 years ago
- ☆12Updated 4 years ago
- ☆21Updated 4 years ago
- Articles accumulated by the 360Quake team.☆15Updated 4 years ago
- os fingerprint probe through smb☆10Updated 4 years ago
- TLS 技术原理与 1.0协议旁路解密实现方法☆26Updated 6 years ago
- CVE-2021-40865☆14Updated 3 years ago
- With the help of this automated script, you will never lose track of recently released CVEs.☆53Updated 3 years ago
- ☆30Updated 2 years ago
- IoT and Operational Technology Honeypot☆104Updated 2 years ago
- Collection of Suricata rule sets that I use modified to my environments.☆40Updated 5 years ago
- SAIVS (Spider Artificial Intelligence Vulnerability Scanner).☆54Updated 4 years ago
- Code snippet accompanying blog post☆30Updated 10 years ago
- nmap service and application version detection (without nmap installation)☆115Updated 7 years ago
- 恶意脚本检测分类工具☆40Updated 4 years ago
- A simple script for quickly mining sensitive information in binary files.☆30Updated 4 years ago