Test suite to validate and demonstrate use cases.
☆18Apr 23, 2026Updated 2 weeks ago
Alternatives and similar repositories for snort3_demo
Users that are interested in snort3_demo are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- External plugins for examples, experimental, and some legacy code.☆44Apr 23, 2026Updated 2 weeks ago
- LibDAQ: The Data AcQuisition Library☆62Mar 18, 2026Updated last month
- FIles and guides related to using Elasticstack as a SIEM☆12May 16, 2020Updated 5 years ago
- Scripts used to create ISO installers of ROCK for offline installation.☆10Mar 13, 2023Updated 3 years ago
- This tweaks the motd do be much cooler☆12May 15, 2017Updated 8 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- My own "I wish I were at DefCon 25" Hack-a-Thon☆10Aug 26, 2021Updated 4 years ago
- Some extracted Features\IoCs\Artifacts\Patterns from APT Malware☆14Mar 4, 2020Updated 6 years ago
- 用于提取文件间差异数据,并且用于在两个端点之间进行差异化的文件同步。核心采用 rsync 算法,并且支持多轮同步以及就地构造文件。☆37Mar 7, 2019Updated 7 years ago
- ☆22Mar 16, 2020Updated 6 years ago
- ☆13Dec 21, 2023Updated 2 years ago
- VirusTotal SIEM Integration and Automation☆18Jan 16, 2017Updated 9 years ago
- Cmdlets for capturing Windows Events☆14Mar 11, 2022Updated 4 years ago
- Tool to use Nmap, in Flask with different types of scans. 👁☆14Mar 12, 2026Updated last month
- ☆50Aug 30, 2020Updated 5 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆11Jul 17, 2022Updated 3 years ago
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆18Feb 9, 2024Updated 2 years ago
- Very basic CLI SIEM (Security Information and Event Management system).☆41Mar 24, 2018Updated 8 years ago
- Simple Software Vulnerability Language (SSVL)☆13Jan 21, 2015Updated 11 years ago
- Domain specific language for modelling dynamic Bayesian networks and estimating posteriors☆13Jul 2, 2024Updated last year
- 🌦️ Domain Ranker☆16Sep 7, 2019Updated 6 years ago
- Demonstration Agents for AIOS☆16Dec 25, 2024Updated last year
- Scripts targeting specific families☆13Jul 3, 2017Updated 8 years ago
- The SAP's extension to OpenAPI Specification defines a standard for describing HTTP APIs at SAP.☆14Apr 6, 2026Updated last month
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A boilerplate for getting up and running with Kodi on your resin-enabled rpi!☆20Aug 17, 2019Updated 6 years ago
- Telegram Bot that performs checks of the yararules.com ruleset☆13May 13, 2016Updated 9 years ago
- dpdk开发相关☆40Nov 3, 2017Updated 8 years ago
- The repository contains IOCs in CSV format for APT, Cyber Crimes, Malware and Trojan and whatever I found as part of hunting and research☆12Jun 10, 2017Updated 8 years ago
- Snort++☆3,316Apr 23, 2026Updated 2 weeks ago
- Terraform Module to create fully stateful Azure firewall as a service with built-in high availability.☆14Oct 29, 2022Updated 3 years ago
- How can you track the hunting techniques you come up with?☆13Sep 3, 2017Updated 8 years ago
- ☆14Dec 3, 2022Updated 3 years ago
- Keyjacker enumerates Mac keychains and displays plain text passwords.☆23Sep 25, 2017Updated 8 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Automated Memory Forensic☆34Jul 18, 2018Updated 7 years ago
- ☆17Sep 14, 2017Updated 8 years ago
- A simple utility for stripping out either the SHA-1, MD5 or CRC values alone from the NSRL hash database☆14Nov 19, 2021Updated 4 years ago
- Tools for parsing Forensic images☆41Dec 14, 2018Updated 7 years ago
- Volatility Framework plugin to detect various types of hooks as performed by banking Trojans☆40Dec 14, 2018Updated 7 years ago
- Snort FAQ☆118Mar 17, 2021Updated 5 years ago
- Technical add-on to ingest json formatted volatility memory analysis plugin outputs☆13May 21, 2018Updated 7 years ago