thereisnotime / Snort-Rules
Collection of Snort 2/3 rules.
☆34Updated 6 years ago
Alternatives and similar repositories for Snort-Rules:
Users that are interested in Snort-Rules are comparing it to the libraries listed below
- zeek-scripts☆43Updated 6 years ago
- Collection of Suricata rule sets that I use modified to my environments.☆39Updated 4 years ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆75Updated 5 months ago
- A Ruleset to enhance detection capabilities of Ossec using Sysmon☆87Updated 2 years ago
- ☆45Updated 6 years ago
- Suricata rules for network anomaly detection☆154Updated last month
- Cyber Threat Intelligence Data, Indicators, and Analysis☆80Updated last month
- The ICS Advisory Project is an open-source project to provide DHS CISA ICS Advisories data in Comma Separated Value (CSV) format to suppo…☆72Updated this week
- This is an open source Snort rules repository☆30Updated 2 years ago
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆35Updated 2 years ago
- Configuring the Suricata IDS to detect DoS attacks by adding custom rule file.☆39Updated 4 years ago
- Open source endpoint agent providing host information to Zeek. [v2]☆72Updated 2 months ago
- ☆29Updated 3 weeks ago
- This repository will hold PCAP IOC data related with known malware samples (owner: Bryant Smith)☆99Updated 3 years ago
- Suricata Verification Tests - Testing Suricata Output☆104Updated this week
- A python app to predict Att&ck tactics and techniques from cyber threat reports☆118Updated last year
- The official Prelude SIEM GitHub of https://www.prelude-siem.org☆23Updated 8 years ago
- Threat Detection & Anomaly Detection rules for popular open-source components☆50Updated 2 years ago
- Suricata rules that can detect a wide range of threats, including malware, exploits, and other malicious activity especially web applicat…☆41Updated 9 months ago
- DGA Detective - Hunt domains generated by Domain Generation Algorithms to identify malware traffic☆39Updated 5 months ago
- Pure python parser for Snort/Suricata rules.☆29Updated 10 months ago
- Suricata rules for the new critical vulnerabilities☆80Updated 3 years ago
- Extensible framework for analyzing publicly available information about vulnerabilities☆109Updated last month
- Sample programs to access the API☆72Updated last week
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆38Updated 2 years ago
- 🚨ATTENTION🚨 The CVE mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here as…☆233Updated 9 months ago
- Mapping NSM rules to MITRE ATT&CK☆68Updated 4 years ago
- The Security Analyst’s Guide to Suricata☆53Updated 7 months ago
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆61Updated 9 months ago
- A curated list of resources related to Industrial Control System (ICS) security.☆21Updated 3 years ago