thereisnotime / Snort-RulesLinks
Collection of Snort 2/3 rules.
☆36Updated 7 years ago
Alternatives and similar repositories for Snort-Rules
Users that are interested in Snort-Rules are comparing it to the libraries listed below
Sorting:
- ☆57Updated 6 years ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆83Updated last week
- This repository has been archived in favor of https://github.com/idaholab/Malcolm-Test-Artifacts☆37Updated 8 months ago
- Cyber Threat Intelligence Data, Indicators, and Analysis☆95Updated 3 weeks ago
- Suricata rules for network anomaly detection☆167Updated 3 months ago
- Convert pcap files into richly-typed ZNG summary logs (Zeek, Suricata, and more)☆83Updated 3 months ago
- Open source endpoint agent providing host information to Zeek. [v2]☆85Updated last month
- Packet captures of malicious traffic for analysis using Wireshark☆59Updated 2 years ago
- Suricata rules that can detect a wide range of threats, including malware, exploits, and other malicious activity especially web applicat…☆50Updated last year
- Sagan is a multi-threads, high performance log analysis engine. At it's core, Sagan similar to Suricata/Snort but with logs rather th…☆184Updated 4 months ago
- The Security Analyst’s Guide to Suricata☆57Updated 3 months ago
- Sample programs to access the API☆89Updated 3 months ago
- ☆55Updated this week
- ☆36Updated 3 weeks ago
- A curated list of awesome things related to Suricata☆185Updated 5 months ago
- Indicators of Compromise☆212Updated last week
- Python scripts for Malware Bazaar☆154Updated last year
- ☆52Updated 3 years ago
- Entropy scanner for Linux to detect packed or encrypted binaries related to malware. Finds malicious files and Linux processes and gives …☆158Updated last year
- Configuring the Suricata IDS to detect DoS attacks by adding custom rule file.☆39Updated 5 years ago
- MITRE Caldera™ for OT Plugins & Capabilities☆217Updated this week
- DynamiteNSM is a free Network Security Monitor developed by Dynamite Analytics to enable network visibility and advanced cyber threat det…☆171Updated 2 years ago
- packet captures of real-world ddos attacks☆162Updated last month
- pcaps of traffic for traffic analysis workshop☆84Updated 3 years ago
- Convert Sigma rules to Wazuh rules☆67Updated last year
- Repo Filled With Follow Along Guides☆79Updated 3 years ago
- Pure python parser for Snort/Suricata rules.☆33Updated last year
- Zeek-Formatted Threat Intelligence Feeds☆374Updated this week
- This repository contains Malicious Indicator of Compromise (IOC) data, which is vital for cybersecurity professionals to enhance threat d…☆101Updated this week
- File analysis and management framework.☆88Updated last year