sudohyak / suricata-rulesView external linksLinks
Suricata rules for the new critical vulnerabilities
☆85Jan 26, 2021Updated 5 years ago
Alternatives and similar repositories for suricata-rules
Users that are interested in suricata-rules are comparing it to the libraries listed below
Sorting:
- Collection of Suricata rule sets that I use modified to my environments.☆39Sep 13, 2020Updated 5 years ago
- Suricata rules for network anomaly detection☆184Feb 7, 2026Updated last week
- ☆35Dec 9, 2023Updated 2 years ago
- Quickly generate suricata rules for IOCs☆28Apr 30, 2021Updated 4 years ago
- OpenWRT Suricata package☆55Feb 19, 2018Updated 7 years ago
- Community-based CybergON-powered Suricata rules☆12Jul 5, 2022Updated 3 years ago
- Mapping NSM rules to MITRE ATT&CK☆73Aug 29, 2020Updated 5 years ago
- Suricata IDS rules 用来检测红队渗透/恶意行为等,支持检测CobaltStrike/MSF/Empire/DNS隧道/Weevely/菜刀/冰蝎/挖矿/反弹shell/ICMP隧道等☆1,266Jul 8, 2023Updated 2 years ago
- CVE-2021-40865☆14Nov 26, 2021Updated 4 years ago
- 威胁检测规则集☆15Jul 5, 2019Updated 6 years ago
- zeek-scripts☆45Dec 27, 2018Updated 7 years ago
- A Yara Lua output script for Suricata☆20Apr 7, 2019Updated 6 years ago
- Scirius is a web application for Suricata ruleset management and threat hunting.☆676Dec 23, 2025Updated last month
- YARA rule-based automation system to detect network attacks at byte-level☆13May 12, 2021Updated 4 years ago
- CGNAT em dispositivos baseados em RouterOS☆12May 14, 2019Updated 6 years ago
- Use your Mikrotik firewall to do fail2ban like blocking of unwanted IPs. Written in Go☆27Jan 14, 2026Updated last month
- A tools to work on suricata stats.log file.☆29Oct 14, 2015Updated 10 years ago
- Kibana 6 Templates for Suricata IDPS Threat Hunting☆24Mar 5, 2019Updated 6 years ago
- The tool for updating your Suricata rules.☆289Oct 31, 2025Updated 3 months ago
- DynamiteNSM is a free Network Security Monitor developed by Dynamite Analytics to enable network visibility and advanced cyber threat det…☆172May 23, 2023Updated 2 years ago
- It contain google dork to find the wsdl file.☆13May 27, 2020Updated 5 years ago
- ☆10Mar 5, 2018Updated 7 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Sep 17, 2019Updated 6 years ago
- Ripple20 Critical Vulnerabilities - Detection Logic and Signatures☆12May 28, 2021Updated 4 years ago
- suricata rules to pcap☆10Mar 25, 2021Updated 4 years ago
- The OTX Suricata Rule Generator can be used to create the rules and configuration for Suricata to alert on indicators from your OTX accou…☆113Apr 26, 2024Updated last year
- Attack Detection☆1,359Aug 31, 2022Updated 3 years ago
- Suricata IDS/IPS log analytics using the Elastic Stack.☆241Jul 28, 2021Updated 4 years ago
- Snort/Suricata DAQ module with DPDK patch☆11Apr 10, 2024Updated last year
- Command-line tool to format and syntax highlight Suricata rules☆13Nov 30, 2019Updated 6 years ago
- Suricata安装部署&丢包优化&性能调优&规则调整&Pfring设置☆144Oct 14, 2019Updated 6 years ago
- Mikrotik bot telegram, http://mikbotam.github.io☆14Apr 2, 2019Updated 6 years ago
- ☆12Apr 23, 2020Updated 5 years ago
- This script scrapes the list of open Bug Bounty Programs from openbugbounty.org☆28Mar 22, 2022Updated 3 years ago
- ☆12Jan 28, 2020Updated 6 years ago
- Python script that automate the process of generating various reverse shells.☆15Mar 22, 2021Updated 4 years ago
- Get Mikrotik's accounting data and push it to influxdb.☆30Oct 31, 2022Updated 3 years ago
- Suricata inside a container using Docker☆28Aug 8, 2023Updated 2 years ago
- Bash script to extract data from the Waybackmachine☆11Mar 15, 2021Updated 4 years ago