thereisnotime / Snort-Rules
Collection of Snort 2/3 rules.
☆35Updated 6 years ago
Alternatives and similar repositories for Snort-Rules:
Users that are interested in Snort-Rules are comparing it to the libraries listed below
- Configuring the Suricata IDS to detect DoS attacks by adding custom rule file.☆39Updated 4 years ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆77Updated 8 months ago
- ☆49Updated 6 years ago
- Cyber Threat Intelligence Data, Indicators, and Analysis☆84Updated 4 months ago
- Sagan is a multi-threads, high performance log analysis engine. At it's core, Sagan similar to Suricata/Snort but with logs rather th…☆168Updated 3 weeks ago
- Threat Detection & Anomaly Detection rules for popular open-source components☆51Updated 2 years ago
- DynamiteNSM is a free Network Security Monitor developed by Dynamite Analytics to enable network visibility and advanced cyber threat det…☆170Updated last year
- ☆53Updated this week
- A library and command line tool for extracting indicators of compromise (IOCs) from security reports in PDF, HTML, Word, or text format☆31Updated 2 weeks ago
- This repository will hold PCAP IOC data related with known malware samples (owner: Bryant Smith)☆101Updated 3 years ago
- Open source endpoint agent providing host information to Zeek. [v2]☆80Updated this week
- Suricata rules for network anomaly detection☆160Updated last week
- Kibana 7 Templates for Suricata IDPS Threat Hunting☆40Updated 2 years ago
- Mapping NSM rules to MITRE ATT&CK☆71Updated 4 years ago
- Repository of creating different example suricata data sets☆34Updated 6 years ago
- Convert Sigma rules to Wazuh rules☆64Updated last year
- The Security Analyst’s Guide to Suricata☆55Updated 10 months ago
- A Ruleset to enhance detection capabilities of Ossec using Sysmon☆92Updated 3 years ago
- Convert pcap files into richly-typed ZNG summary logs (Zeek, Suricata, and more)☆80Updated this week
- YAIDS - Yara-Based IDS - Yara as an Intrusion Detection System / Yet Another Intrusion Detection System - An Intrusion Detection System (…☆23Updated 2 years ago
- This is an open source Snort rules repository☆30Updated 2 years ago
- ☆51Updated 3 years ago
- Hands-On Network Forensics by Nipun Jaswal☆46Updated last year
- Threat-Intelligence Feeds & Tools & Frameworks☆215Updated 10 months ago
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆35Updated 2 years ago
- zeek-scripts☆44Updated 6 years ago
- Packet captures of malicious traffic for analysis using Wireshark☆58Updated last year
- A python app to predict Att&ck tactics and techniques from cyber threat reports☆120Updated last year
- Collection of Suricata rule sets that I use modified to my environments.☆39Updated 4 years ago
- aka GENESIDS: Reads and parses rules using a "snort like" syntax and generates and sends packets that trigger events in signature based I…☆22Updated 6 years ago