☆35Feb 27, 2026Updated last week
Alternatives and similar repositories for sagan-rules
Users that are interested in sagan-rules are comparing it to the libraries listed below
Sorting:
- Sagan is a multi-threads, high performance log analysis engine. At it's core, Sagan similar to Suricata/Snort but with logs rather th…☆193Oct 6, 2025Updated 5 months ago
- Meer is a "spooler" for Suricata / Sagan.☆30Jun 21, 2023Updated 2 years ago
- ☆17Jan 22, 2026Updated last month
- mister-skinnylegs is an open plugin framework for parsing website/webapp artifacts in browser data. It currently provides a command line …☆18Nov 14, 2025Updated 3 months ago
- Log examples of vCenter Server Authentication & Authorization activities☆17Apr 8, 2019Updated 6 years ago
- Publicly shareable windows event log message data☆28Nov 29, 2019Updated 6 years ago
- Binaries for the log2timeline projects and dependencies☆40Feb 8, 2026Updated 3 weeks ago
- ☆11Feb 6, 2026Updated last month
- Offline amnesic live Linux distribution☆14Mar 8, 2025Updated 11 months ago
- CloudPathSniffer is an open-source, easy to use and extensible Cloud Anomaly Detection platform designed to help security teams to find h…☆13Nov 30, 2023Updated 2 years ago
- Mitre ATT&CK and Suricata Rules Automation with AI & LLM☆14Sep 28, 2024Updated last year
- Scripts and things.☆13Jan 23, 2026Updated last month
- 一个超级缝合怪的图形化渗透工具☆36Sep 7, 2021Updated 4 years ago
- A Repository created solely for Sathyabama University Students to develop Open-Source Temper where they can add code in any language they…☆13Mar 14, 2020Updated 5 years ago
- This is a simple MD5 Hash Cracker tool to decrypt it. The usage is :☆11Dec 29, 2018Updated 7 years ago
- Powershell script to easily create new users in AD and send email confirmations☆12Nov 23, 2020Updated 5 years ago
- A proof of concept for Joomla's CVE-2015-8562 vulnerability (Object Injection RCE)☆10May 3, 2024Updated last year
- Linux integrity monitoring for CentOS/RHEL☆12May 13, 2020Updated 5 years ago
- ☆11Jul 19, 2021Updated 4 years ago
- Suricata rules for network anomaly detection☆183Feb 7, 2026Updated last month
- Dissect triage scripts for Citrix NetScaler devices☆69Nov 17, 2025Updated 3 months ago
- Analysis of file (doc, pdf, exe, ...) in deep (emmbedded file(s)) with clamscan and yara rules☆51Sep 6, 2023Updated 2 years ago
- The ultimate streamline for Volatility 3. Speed up process of memory artifacts extraction phase☆14Dec 19, 2024Updated last year
- A simple jamming attack with GNU randio and gaussian noise source☆13Mar 28, 2019Updated 6 years ago
- Scanning alive hosts of the given CIDR range in parallel.☆10May 8, 2025Updated 9 months ago
- golang utils☆10Dec 8, 2022Updated 3 years ago
- An Android app that allows the RingMyPhone Pebble app to wake your Android phone up and start it ringing so you can find it.☆16Feb 13, 2022Updated 4 years ago
- Utility to generate a TLS Certificate.☆17Apr 11, 2020Updated 5 years ago
- For finding secrets, tokens and other common mistakes made by developers.☆12Oct 21, 2025Updated 4 months ago
- CLI generator for Velociraptor offline collector☆16Oct 10, 2025Updated 4 months ago
- Pritunl Access Control System☆10Feb 16, 2023Updated 3 years ago
- Simons Observatory specific OCS agents.☆15Feb 23, 2026Updated last week
- Run Lineage 2 without client modifications.☆13Feb 14, 2017Updated 9 years ago
- DemocracyMap aims to provide normalized structured data for all of the contact details and other primary information for every government…☆28Jan 4, 2016Updated 10 years ago
- Top DNS Measurement for Bro☆10Aug 22, 2020Updated 5 years ago
- Warning! Don't run this code on your computer.☆15Mar 29, 2019Updated 6 years ago
- Static analysis tool to Identify and Fix GitHub Actions prone to Supply‑Chain Risks☆14Dec 24, 2025Updated 2 months ago
- Collect AWS logs and query them instantly with SQL! Open source CLI. No DB required.☆16Updated this week
- Community-based CybergON-powered Suricata rules☆12Jul 5, 2022Updated 3 years ago