Suricata, Snort and Zeek IDS rule and pcap testing system
☆517Mar 13, 2026Updated last month
Alternatives and similar repositories for dalton
Users that are interested in dalton are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- a network packet capture compiler☆207Apr 28, 2022Updated 4 years ago
- Web Based Event Viewer (GUI) for Suricata EVE Events in Elastic Search☆490Apr 25, 2026Updated last week
- Attack Detection☆1,359Aug 31, 2022Updated 3 years ago
- gonids is a library to parse IDS rules, with a focus primarily on Suricata rule compatibility. There is a discussion forum available that…☆193Jul 18, 2025Updated 9 months ago
- Scirius is a web application for Suricata ruleset management and threat hunting.☆675Dec 23, 2025Updated 4 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- The tool for updating your Suricata rules.☆296Oct 31, 2025Updated 6 months ago
- A set of ICS IDS rules for use with Suricata.☆52Oct 13, 2023Updated 2 years ago
- idstools: Snort and Suricata Rule and Event Utilities in Python (Including a Rule Update Tool)☆285Jul 10, 2025Updated 9 months ago
- Suricata Extreme Performance Tuning guide☆213Mar 15, 2018Updated 8 years ago
- Suricata rules for network anomaly detection☆182Apr 14, 2026Updated 2 weeks ago
- ☆174Jul 7, 2021Updated 4 years ago
- ☆35Dec 9, 2023Updated 2 years ago
- Suricata Language Server is an implementation of the Language Server Protocol for Suricata signatures. It adds syntax check, hints and au…☆86Apr 13, 2026Updated 2 weeks ago
- ☆17Mar 13, 2026Updated last month
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Collection of various open-source an commercial rulesets for NIDS (especially for Suricata and Snort)☆29Jul 24, 2023Updated 2 years ago
- Web service for scanning pcaps with snort☆110Jul 4, 2018Updated 7 years ago
- fast, extensible, versatile event router for Suricata's EVE-JSON format☆57Mar 19, 2026Updated last month
- Suricata IDS rules 用来检测红队渗透/恶意行为等,支持检测CobaltStrike/MSF/Empire/DNS隧道/Weevely/菜刀/冰蝎/挖矿/反弹shell/ICMP隧道等☆1,269Jul 8, 2023Updated 2 years ago
- A Suricata based NDR distribution☆1,592Sep 13, 2025Updated 7 months ago
- Tenzir is the data pipeline engine for security teams.☆735Apr 25, 2026Updated last week
- Passive DNS server interface compliant to "Common Output Format"☆10Sep 19, 2016Updated 9 years ago
- Online hash checker for Virustotal and other services☆848Mar 21, 2025Updated last year
- Your Everyday Threat Intelligence☆1,974Apr 14, 2026Updated 2 weeks ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆39Nov 2, 2024Updated last year
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,511Jan 12, 2026Updated 3 months ago
- Re-play Security Events☆1,743Mar 20, 2024Updated 2 years ago
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆2,395Updated this week
- ☆74Feb 17, 2022Updated 4 years ago
- Accurate, modular, scalable PCAP manipulation tool written in Go.☆96Apr 30, 2024Updated 2 years ago
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆3,171Apr 22, 2026Updated last week
- Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine developed by the OIS…☆6,206Updated this week
- Suricata JSON schema project☆12Jan 5, 2020Updated 6 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Pulled Pork for Snort and Suricata rule management (from Google code)☆442Jul 7, 2021Updated 4 years ago
- FAME Automates Malware Evaluation☆939Updated this week
- HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints…☆548May 1, 2025Updated last year
- Main Sigma Rule Repository☆10,355Apr 24, 2026Updated last week
- pCraft is a PCAP Crafter, which creates a PCAP from an AMI scenario.☆92Apr 11, 2024Updated 2 years ago
- FakeNet-NG - Next Generation Dynamic Network Analysis Tool☆2,120Apr 2, 2026Updated last month
- Specifications used in the MISP project including MISP core format☆54Jan 7, 2026Updated 3 months ago