suricata rules to pcap
☆10Mar 25, 2021Updated 4 years ago
Alternatives and similar repositories for suricata2pcap
Users that are interested in suricata2pcap are comparing it to the libraries listed below
Sorting:
- Quickly generate suricata rules for IOCs☆28Apr 30, 2021Updated 4 years ago
- A KOP(Keen On Packet, 靠谱) DPI System which supports script rules which can describe behavior instead of application and performs triple s…☆17Jul 27, 2012Updated 13 years ago
- ☆35Dec 9, 2023Updated 2 years ago
- Burp Extension to manipulate AES encrypted payloads☆13Feb 4, 2022Updated 4 years ago
- Suricata LUA scripts to detect CVE-2019-12255, CVE-2019-12256, CVE-2019-12258, and CVE-2019-12260☆19Nov 28, 2019Updated 6 years ago
- WebHook for Red Team☆26Feb 27, 2021Updated 5 years ago
- Duitku Payment gateway for PHPNuxBill☆12Aug 23, 2025Updated 6 months ago
- Meer is a "spooler" for Suricata / Sagan.☆30Jun 21, 2023Updated 2 years ago
- Suricata rule and intel index☆33Jan 13, 2026Updated last month
- A repository for a Deep Q-Learning approach to intrusion detection for networks cyber-attacks.☆10Sep 3, 2021Updated 4 years ago
- 安 卓远控,天线6.0 无限使用版☆11Sep 9, 2023Updated 2 years ago
- SPPNet: An Appoach For Real-Time Encrypted Traffic Classification Using Deep Learning☆10Aug 6, 2024Updated last year
- pcapdj - dispatch pcap files☆46Jul 28, 2020Updated 5 years ago
- 网易云音乐MCP智能控制器,提供全局快捷键、搜索单曲播放、搜索歌单播放、自定义歌单管理、每日推荐和私人漫游等丰富功能。☆18Aug 4, 2025Updated 7 months ago
- Samsung Galaxy A52s 5G (a52sxq) TWRP Device Tree.☆12Jan 27, 2024Updated 2 years ago
- Mitre ATT&CK and Suricata Rules Automation with AI & LLM☆14Sep 28, 2024Updated last year
- TLS scanning component of OWASP PurpleTeam☆11Feb 8, 2023Updated 3 years ago
- This is a bash script used for ISPConfig 3 server migrations☆15Sep 13, 2016Updated 9 years ago
- A few snippets to show how suricata stats can end up in Influx DB using logstash☆12Jul 11, 2016Updated 9 years ago
- Identify QuasarRAT/AsyncRAT/DcRAT/VenomRAT servers through scanning☆13Apr 20, 2024Updated last year
- 计算概论大作业,Qt,猫捉老鼠小游戏☆12Jan 15, 2019Updated 7 years ago
- 👤 🗑 Deletes users that did not log in in the last days.☆10Updated this week
- Aplikasi untuk menganalisis log Mikrotik dengan interface modern menggunakan EJS, Express, Element UI, dan Alpine.js.☆27Nov 8, 2025Updated 3 months ago
- 图片炫酷动画展示 在线演示https://hanruto.github.io/image-show/imageCss.html☆12Feb 18, 2017Updated 9 years ago
- Ultimate Internet of Things/Industrial Control Systems reconnaissance tool.☆11Feb 11, 2022Updated 4 years ago
- Tool useful to discover services behind unknown ports☆14May 20, 2021Updated 4 years ago
- Run x509lint from a PostgreSQL function☆11Apr 3, 2020Updated 5 years ago
- Replication files for arXiv:1805.03735 Sequence Aggregation Rules for Anomaly Detection in Computer Network Traffic☆11Jan 6, 2019Updated 7 years ago
- Fathimah bot Telegram support plugins.☆13Aug 19, 2017Updated 8 years ago
- UCAS 数据挖掘课程项目 Option 1: 2020 CCF 大数据与计算智能大赛 风电机组异常数据识别与清洗☆10Aug 15, 2021Updated 4 years ago
- ☆22Aug 29, 2025Updated 6 months ago
- YARA rule-based automation system to detect network attacks at byte-level☆13May 12, 2021Updated 4 years ago
- BruteProxy.py framework for brute-forcing via HTTP/HTTPS requests with looping proxies.☆12Jan 12, 2026Updated last month
- CGNAT em dispositivos baseados em RouterOS☆12May 14, 2019Updated 6 years ago
- Hikvision IP camera access bypass exploit, developed by golang.☆11Jan 11, 2021Updated 5 years ago
- ☆16Aug 17, 2025Updated 6 months ago
- malware-traffic-analysis.net PCAPs repository.☆37Jun 9, 2016Updated 9 years ago
- CA Issuers Monitor (Authority Info Access)☆13Mar 8, 2023Updated 2 years ago
- Simple nike+ client in js (view profile, activities, export to GPX, TCX...)☆13Jan 23, 2018Updated 8 years ago