Wireshark plugin to display Suricata analysis info
☆94Nov 5, 2021Updated 4 years ago
Alternatives and similar repositories for suriwire
Users that are interested in suriwire are comparing it to the libraries listed below
Sorting:
- A tools to work on suricata stats.log file.☆29Oct 14, 2015Updated 10 years ago
- Kibana 6 Templates for Suricata IDPS Threat Hunting☆24Mar 5, 2019Updated 6 years ago
- The Security Analyst’s Guide to Suricata☆61Apr 28, 2025Updated 10 months ago
- Suricata Verification Tests - Testing Suricata Output☆118Updated this week
- Suricata Language Server is an implementation of the Language Server Protocol for Suricata signatures. It adds syntax check, hints and au…☆84Feb 20, 2026Updated last week
- Set of scripts to index PCAP files and retrieve packets☆14Sep 10, 2015Updated 10 years ago
- Web Based Event Viewer (GUI) for Suricata EVE Events in Elastic Search☆485Feb 19, 2026Updated last week
- ☆17Feb 21, 2025Updated last year
- pCraft is a PCAP Crafter, which creates a PCAP from an AMI scenario.☆92Apr 11, 2024Updated last year
- a network packet capture compiler☆205Apr 28, 2022Updated 3 years ago
- Help summarize a PCAP file☆33Dec 27, 2011Updated 14 years ago
- Suricata rule and intel index☆33Jan 13, 2026Updated last month
- fast, extensible, versatile event router for Suricata's EVE-JSON format☆57Nov 20, 2025Updated 3 months ago
- A Yara Lua output script for Suricata☆20Apr 7, 2019Updated 6 years ago
- ☆74Feb 17, 2022Updated 4 years ago
- ☆72Nov 17, 2021Updated 4 years ago
- Isolated, Scalable, & Lightweight Environment for Training☆111Jun 24, 2019Updated 6 years ago
- Improvements of/over the original rule2alert☆56Dec 28, 2014Updated 11 years ago
- ☆19Sep 2, 2018Updated 7 years ago
- The tool for updating your Suricata rules.☆291Oct 31, 2025Updated 4 months ago
- Scirius is a web application for Suricata ruleset management and threat hunting.☆673Dec 23, 2025Updated 2 months ago
- Script for generating Bro intel files from pdf or html reports☆77Dec 7, 2015Updated 10 years ago
- A simple python library to assist in working with cpes☆19Jan 30, 2024Updated 2 years ago
- Example Suricata rules implementing some of my detection tactics☆22Jan 13, 2023Updated 3 years ago
- Look into EDR events from network☆25Nov 20, 2025Updated 3 months ago
- SSH Multipot☆24Apr 30, 2018Updated 7 years ago
- ☆11Nov 26, 2025Updated 3 months ago
- Zeek support for Community ID flow hashing.☆37Jul 11, 2023Updated 2 years ago
- Dockerfiles for NSM tools☆84Apr 14, 2017Updated 8 years ago
- Signature engine for all your logs☆172Nov 13, 2023Updated 2 years ago
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆70Feb 3, 2022Updated 4 years ago
- Security Monitoring Resolution Categories☆138Nov 25, 2021Updated 4 years ago
- HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints…☆544May 1, 2025Updated 10 months ago
- Templates for Kibana/Logstash to use with Suricata IDPS☆81Mar 12, 2016Updated 9 years ago
- Golang code to crawl website, extract links from html, paths from JavaScript code, follow and repeat.☆12Jun 4, 2018Updated 7 years ago
- Yara rules I've written☆10Dec 9, 2015Updated 10 years ago
- Dockerized Zeek☆12Mar 9, 2024Updated last year
- BASH + VIM = Cryptolocker☆11Jul 31, 2018Updated 7 years ago
- How to Zeek Sysmon Logs!☆103Feb 12, 2022Updated 4 years ago