thereisnotime / Snort-RulesLinks
Collection of Snort 2/3 rules.
☆39Updated 7 years ago
Alternatives and similar repositories for Snort-Rules
Users that are interested in Snort-Rules are comparing it to the libraries listed below
Sorting:
- A completely automated anomaly detector Zeek network flows files (conn.log).☆82Updated 3 months ago
- Convert pcap files into richly-typed ZNG summary logs (Zeek, Suricata, and more)☆91Updated 6 months ago
- ☆59Updated 7 years ago
- Suricata rules for network anomaly detection☆175Updated 2 weeks ago
- ☆53Updated 3 years ago
- OpenCTI Docker deployment helpers☆212Updated last week
- Suricata rules that can detect a wide range of threats, including malware, exploits, and other malicious activity especially web applicat…☆55Updated last year
- Packet captures of malicious traffic for analysis using Wireshark☆62Updated 2 years ago
- Sample programs to access the API☆93Updated 6 months ago
- Repo Filled With Follow Along Guides☆79Updated 3 years ago
- Threat Detection & Anomaly Detection rules for popular open-source components☆53Updated 3 years ago
- Zeek-Formatted Threat Intelligence Feeds☆378Updated this week
- Cyber Threat Intelligence Data, Indicators, and Analysis☆99Updated last month
- Python scripts for Malware Bazaar☆156Updated last year
- The Security Analyst’s Guide to Suricata☆60Updated 6 months ago
- ☆36Updated 2 months ago
- Open source endpoint agent providing host information to Zeek. [v2]☆86Updated last week
- DynamiteNSM is a free Network Security Monitor developed by Dynamite Analytics to enable network visibility and advanced cyber threat det…☆171Updated 2 years ago
- This repository has been archived in favor of https://github.com/idaholab/Malcolm-Test-Artifacts☆37Updated 10 months ago
- Indicators of Compromise☆228Updated this week
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆37Updated 3 years ago
- Hands-On Network Forensics by Nipun Jaswal☆57Updated 2 years ago
- ☆34Updated this week
- ☆54Updated last year
- A Ruleset to enhance detection capabilities of Ossec using Sysmon☆94Updated 3 years ago
- Mapping NSM rules to MITRE ATT&CK☆72Updated 5 years ago
- The official Prelude SIEM GitHub of https://www.prelude-siem.org☆33Updated 9 years ago
- Convert Sigma rules to Wazuh rules☆73Updated last month
- The Project can be used to integrate QRadar with MISP Threat Sharing Platform☆40Updated 3 years ago
- Repository of creating different example suricata data sets☆36Updated 6 years ago