Suricata, Snort and Zeek IDS rule and pcap testing system
☆512Feb 17, 2026Updated last week
Alternatives and similar repositories for dalton
Users that are interested in dalton are comparing it to the libraries listed below
Sorting:
- a network packet capture compiler☆205Apr 28, 2022Updated 3 years ago
- Web Based Event Viewer (GUI) for Suricata EVE Events in Elastic Search☆484Feb 19, 2026Updated last week
- Attack Detection☆1,358Aug 31, 2022Updated 3 years ago
- gonids is a library to parse IDS rules, with a focus primarily on Suricata rule compatibility. There is a discussion forum available that…☆192Jul 18, 2025Updated 7 months ago
- Scirius is a web application for Suricata ruleset management and threat hunting.☆673Dec 23, 2025Updated 2 months ago
- The tool for updating your Suricata rules.☆293Oct 31, 2025Updated 4 months ago
- idstools: Snort and Suricata Rule and Event Utilities in Python (Including a Rule Update Tool)☆284Jul 10, 2025Updated 7 months ago
- Suricata rules for network anomaly detection☆184Feb 7, 2026Updated 3 weeks ago
- ☆173Jul 7, 2021Updated 4 years ago
- Suricata Extreme Performance Tuning guide☆213Mar 15, 2018Updated 7 years ago
- A set of ICS IDS rules for use with Suricata.☆51Oct 13, 2023Updated 2 years ago
- Suricata Language Server is an implementation of the Language Server Protocol for Suricata signatures. It adds syntax check, hints and au…☆86Updated this week
- ☆35Dec 9, 2023Updated 2 years ago
- Web service for scanning pcaps with snort☆110Jul 4, 2018Updated 7 years ago
- Passive DNS server interface compliant to "Common Output Format"☆10Sep 19, 2016Updated 9 years ago
- A Suricata based NDR distribution☆1,588Sep 13, 2025Updated 5 months ago
- Your Everyday Threat Intelligence☆1,951Feb 12, 2026Updated 2 weeks ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,515Jan 12, 2026Updated last month
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆3,136Oct 19, 2025Updated 4 months ago
- fast, extensible, versatile event router for Suricata's EVE-JSON format☆57Nov 20, 2025Updated 3 months ago
- ☆17Feb 21, 2025Updated last year
- Online hash checker for Virustotal and other services☆846Mar 21, 2025Updated 11 months ago
- Docker based Suricata, Elasticsearch, Logstash, Kibana, Scirius aka SELKS☆184Sep 13, 2022Updated 3 years ago
- Suricata IDS rules 用来检测红队渗透/恶意行为等,支持检测CobaltStrike/MSF/Empire/DNS隧道/Weevely/菜刀/冰蝎/挖矿/反弹shell/ICMP隧道等☆1,262Jul 8, 2023Updated 2 years ago
- HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints…☆545May 1, 2025Updated 10 months ago
- Re-play Security Events☆1,723Mar 20, 2024Updated last year
- Loki - Simple IOC and YARA Scanner☆3,726Jan 12, 2026Updated last month
- Full Packet Capture for the Masses☆14Sep 13, 2018Updated 7 years ago
- Tenzir is the data pipeline engine for security teams.☆722Updated this week
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆2,344Feb 19, 2026Updated last week
- Main Sigma Rule Repository☆10,145Feb 19, 2026Updated last week
- Accurate, modular, scalable PCAP manipulation tool written in Go.☆96Apr 30, 2024Updated last year
- FakeNet-NG - Next Generation Dynamic Network Analysis Tool☆2,083Dec 9, 2025Updated 2 months ago
- Collection of various open-source an commercial rulesets for NIDS (especially for Suricata and Snort)☆29Jul 24, 2023Updated 2 years ago
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,486Jan 12, 2026Updated last month
- Beagle is an incident response and digital forensics tool which transforms security logs and data into graphs.☆1,339Dec 13, 2022Updated 3 years ago
- Protocol Analysis/Decoder Framework☆497Dec 19, 2022Updated 3 years ago
- Pulled Pork for Snort and Suricata rule management (from Google code)☆441Jul 7, 2021Updated 4 years ago
- Windows Events Attack Samples☆2,515Jan 24, 2023Updated 3 years ago