Suricata, Snort and Zeek IDS rule and pcap testing system
☆511Mar 13, 2026Updated last week
Alternatives and similar repositories for dalton
Users that are interested in dalton are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- a network packet capture compiler☆205Apr 28, 2022Updated 3 years ago
- Web Based Event Viewer (GUI) for Suricata EVE Events in Elastic Search☆485Updated this week
- Attack Detection☆1,360Aug 31, 2022Updated 3 years ago
- gonids is a library to parse IDS rules, with a focus primarily on Suricata rule compatibility. There is a discussion forum available that…☆193Jul 18, 2025Updated 8 months ago
- Scirius is a web application for Suricata ruleset management and threat hunting.☆675Dec 23, 2025Updated 3 months ago
- The tool for updating your Suricata rules.☆294Oct 31, 2025Updated 4 months ago
- A set of ICS IDS rules for use with Suricata.☆52Oct 13, 2023Updated 2 years ago
- idstools: Snort and Suricata Rule and Event Utilities in Python (Including a Rule Update Tool)☆284Jul 10, 2025Updated 8 months ago
- Suricata Extreme Performance Tuning guide☆213Mar 15, 2018Updated 8 years ago
- Suricata rules for network anomaly detection☆183Feb 7, 2026Updated last month
- ☆174Jul 7, 2021Updated 4 years ago
- ☆35Dec 9, 2023Updated 2 years ago
- Suricata Language Server is an implementation of the Language Server Protocol for Suricata signatures. It adds syntax check, hints and au…☆86Updated this week
- ☆17Mar 13, 2026Updated last week
- Collection of various open-source an commercial rulesets for NIDS (especially for Suricata and Snort)☆29Jul 24, 2023Updated 2 years ago
- Web service for scanning pcaps with snort☆110Jul 4, 2018Updated 7 years ago
- fast, extensible, versatile event router for Suricata's EVE-JSON format☆57Updated this week
- Suricata IDS rules 用来检测红队渗透/恶意行为等,支持检测CobaltStrike/MSF/Empire/DNS隧道/Weevely/菜刀/冰蝎/挖矿/反弹shell/ICMP隧道等☆1,266Jul 8, 2023Updated 2 years ago
- A Suricata based NDR distribution☆1,588Sep 13, 2025Updated 6 months ago
- Tenzir is the data pipeline engine for security teams.☆730Updated this week
- Passive DNS server interface compliant to "Common Output Format"☆10Sep 19, 2016Updated 9 years ago
- Online hash checker for Virustotal and other services☆846Mar 21, 2025Updated last year
- Your Everyday Threat Intelligence☆1,959Mar 16, 2026Updated last week
- ☆38Nov 2, 2024Updated last year
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,516Jan 12, 2026Updated 2 months ago
- Re-play Security Events☆1,728Mar 20, 2024Updated 2 years ago
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆2,362Feb 19, 2026Updated last month
- ☆74Feb 17, 2022Updated 4 years ago
- Accurate, modular, scalable PCAP manipulation tool written in Go.☆96Apr 30, 2024Updated last year
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆3,141Oct 19, 2025Updated 5 months ago
- Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine developed by the OIS…☆6,081Updated this week
- Suricata JSON schema project☆12Jan 5, 2020Updated 6 years ago
- Pulled Pork for Snort and Suricata rule management (from Google code)☆441Jul 7, 2021Updated 4 years ago
- FAME Automates Malware Evaluation☆931Dec 16, 2025Updated 3 months ago
- Main Sigma Rule Repository☆10,224Updated this week
- HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints…☆546May 1, 2025Updated 10 months ago
- pCraft is a PCAP Crafter, which creates a PCAP from an AMI scenario.☆92Apr 11, 2024Updated last year
- FakeNet-NG - Next Generation Dynamic Network Analysis Tool☆2,096Dec 9, 2025Updated 3 months ago
- Specifications used in the MISP project including MISP core format☆53Jan 7, 2026Updated 2 months ago