seanlinmt / suricataView external linksLinks
OpenWRT Suricata package
☆55Feb 19, 2018Updated 7 years ago
Alternatives and similar repositories for suricata
Users that are interested in suricata are comparing it to the libraries listed below
Sorting:
- Repository of creating different example suricata data sets☆37Jan 2, 2019Updated 7 years ago
- Mass Suricata rules creator, from a list of domain☆14Sep 14, 2018Updated 7 years ago
- Suricata rules for the new critical vulnerabilities☆85Jan 26, 2021Updated 5 years ago
- A Yara Lua output script for Suricata☆20Apr 7, 2019Updated 6 years ago
- server for indexing and querying passive DNS observations☆49Jan 12, 2026Updated last month
- Kibana 6 Templates for Suricata IDPS Threat Hunting☆24Mar 5, 2019Updated 6 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Sep 17, 2019Updated 6 years ago
- Community-based CybergON-powered Suricata rules☆12Jul 5, 2022Updated 3 years ago
- ☆16May 30, 2025Updated 8 months ago
- Command-line tool to format and syntax highlight Suricata rules☆13Nov 30, 2019Updated 6 years ago
- a-ray-grass is a yara module that provides support for DCSO-format bloom filters in yara. In the context of hashlookup, it allows quickly…☆14Aug 19, 2022Updated 3 years ago
- ☆12Apr 23, 2020Updated 5 years ago
- ☆12Jan 28, 2020Updated 6 years ago
- Automatically exported from code.google.com/p/dumbpig☆12Sep 5, 2018Updated 7 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Apr 18, 2020Updated 5 years ago
- Suricata rules for network anomaly detection☆184Feb 7, 2026Updated last week
- ☆14Apr 1, 2019Updated 6 years ago
- Mikrotik's Winbox in a docker container accessible via noVNC through a web browser.☆13May 12, 2025Updated 9 months ago
- Suricata rules to detect Winnti communication☆16Mar 5, 2018Updated 7 years ago
- ☆35Dec 9, 2023Updated 2 years ago
- Suricata安装部署&丢包优化&性能调优&规则调整&Pfring设置☆144Oct 14, 2019Updated 6 years ago
- An Ansible playbook for deploying the Suricata intrusion detection system and fetching Snort rules with Oinkmaster.☆17Oct 30, 2021Updated 4 years ago
- Go implementation of the Community ID flow hashing standard☆21Apr 17, 2025Updated 9 months ago
- ☆17Jan 29, 2020Updated 6 years ago
- The OTX Suricata Rule Generator can be used to create the rules and configuration for Suricata to alert on indicators from your OTX accou…☆113Apr 26, 2024Updated last year
- Templates for Kibana/Logstash to use with Suricata IDPS☆81Mar 12, 2016Updated 9 years ago
- Kibana 7 Templates for Suricata IDPS Threat Hunting☆43Dec 23, 2025Updated last month
- suricata eve.json parser in Go☆15May 16, 2019Updated 6 years ago
- Collection of Suricata rule sets that I use modified to my environments.☆39Sep 13, 2020Updated 5 years ago
- useful mikrotik functions☆21Oct 8, 2025Updated 4 months ago
- Ansible configurations for Ceph.com infrastructure☆24Feb 7, 2026Updated last week
- Meer (GPLv2) is a dedicated "spooler" for the Suricata & Sagan EVE output formats.☆23Feb 9, 2021Updated 5 years ago
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆24Aug 1, 2022Updated 3 years ago
- The tool for updating your Suricata rules.☆289Oct 31, 2025Updated 3 months ago
- fast, extensible, versatile event router for Suricata's EVE-JSON format☆57Nov 20, 2025Updated 2 months ago
- Use your Mikrotik firewall to do fail2ban like blocking of unwanted IPs. Written in Go☆27Jan 14, 2026Updated 3 weeks ago
- Suricata IDS rules 用来检测红队渗透/恶意行为等,支持检测CobaltStrike/MSF/Empire/DNS隧道/Weevely/菜刀/冰蝎/挖矿/反弹shell/ICMP隧道等☆1,266Jul 8, 2023Updated 2 years ago
- ☆24Mar 19, 2020Updated 5 years ago
- An Ubuntu 16.04 build containing Suricata, PulledPork, Bro, and Splunk☆23Jul 10, 2018Updated 7 years ago