Suricata rules for the new critical vulnerabilities
☆84Jan 26, 2021Updated 5 years ago
Alternatives and similar repositories for suricata-rules
Users that are interested in suricata-rules are comparing it to the libraries listed below
Sorting:
- Collection of Suricata rule sets that I use modified to my environments.☆39Sep 13, 2020Updated 5 years ago
- Mass Suricata rules creator, from a list of domain☆14Sep 14, 2018Updated 7 years ago
- Suricata rules for network anomaly detection☆183Feb 7, 2026Updated last month
- ☆35Dec 9, 2023Updated 2 years ago
- Quickly generate suricata rules for IOCs☆28Apr 30, 2021Updated 4 years ago
- OpenWRT Suricata package☆57Feb 19, 2018Updated 8 years ago
- Community-based CybergON-powered Suricata rules☆12Jul 5, 2022Updated 3 years ago
- Mapping NSM rules to MITRE ATT&CK☆73Aug 29, 2020Updated 5 years ago
- Suricata IDS rules 用来检测红队渗透/恶意行为等,支持检测CobaltStrike/MSF/Empire/DNS隧道/Weevely/菜刀/冰蝎/挖矿/反弹shell/ICMP隧道等☆1,261Jul 8, 2023Updated 2 years ago
- CVE-2021-40865☆14Nov 26, 2021Updated 4 years ago
- zeek-scripts☆44Dec 27, 2018Updated 7 years ago
- A Yara Lua output script for Suricata☆20Apr 7, 2019Updated 6 years ago
- A few snippets to show how suricata stats can end up in Influx DB using logstash☆12Jul 11, 2016Updated 9 years ago
- Scirius is a web application for Suricata ruleset management and threat hunting.☆675Dec 23, 2025Updated 2 months ago
- CGNAT em dispositivos baseados em RouterOS☆12May 14, 2019Updated 6 years ago
- YARA rule-based automation system to detect network attacks at byte-level☆13May 12, 2021Updated 4 years ago
- Use your Mikrotik firewall to do fail2ban like blocking of unwanted IPs. Written in Go☆27Feb 23, 2026Updated last week
- A tools to work on suricata stats.log file.☆29Oct 14, 2015Updated 10 years ago
- Kibana 6 Templates for Suricata IDPS Threat Hunting☆24Mar 5, 2019Updated 7 years ago
- DynamiteNSM is a free Network Security Monitor developed by Dynamite Analytics to enable network visibility and advanced cyber threat det…☆172May 23, 2023Updated 2 years ago
- The tool for updating your Suricata rules.☆293Oct 31, 2025Updated 4 months ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Sep 17, 2019Updated 6 years ago
- ☆10Mar 5, 2018Updated 8 years ago
- suricata rules to pcap☆10Mar 25, 2021Updated 4 years ago
- It contain google dork to find the wsdl file.☆13May 27, 2020Updated 5 years ago
- Attack Detection☆1,358Aug 31, 2022Updated 3 years ago
- The OTX Suricata Rule Generator can be used to create the rules and configuration for Suricata to alert on indicators from your OTX accou…☆115Apr 26, 2024Updated last year
- Suricata IDS/IPS log analytics using the Elastic Stack.☆240Jul 28, 2021Updated 4 years ago
- Snort/Suricata DAQ module with DPDK patch☆11Apr 10, 2024Updated last year
- Command-line tool to format and syntax highlight Suricata rules☆13Nov 30, 2019Updated 6 years ago
- Suricata安装部署&丢包优化&性能调优&规则调整&Pfring设置☆143Oct 14, 2019Updated 6 years ago
- ☆12Jan 28, 2020Updated 6 years ago
- This script scrapes the list of open Bug Bounty Programs from openbugbounty.org☆28Mar 22, 2022Updated 3 years ago
- Python script that automate the process of generating various reverse shells.☆15Mar 22, 2021Updated 4 years ago
- Mikrotik bot telegram, http://mikbotam.github.io☆14Apr 2, 2019Updated 6 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Apr 18, 2020Updated 5 years ago
- Suricata inside a container using Docker☆28Aug 8, 2023Updated 2 years ago
- Get Mikrotik's accounting data and push it to influxdb.☆30Oct 31, 2022Updated 3 years ago
- ☆12Jan 4, 2022Updated 4 years ago