thereisnotime / Snort-Rules
Collection of Snort 2/3 rules.
☆36Updated 6 years ago
Alternatives and similar repositories for Snort-Rules
Users that are interested in Snort-Rules are comparing it to the libraries listed below
Sorting:
- A completely automated anomaly detector Zeek network flows files (conn.log).☆78Updated 9 months ago
- Configuring the Suricata IDS to detect DoS attacks by adding custom rule file.☆39Updated 5 years ago
- ☆34Updated 3 months ago
- Open source endpoint agent providing host information to Zeek. [v2]☆80Updated this week
- Threat Detection & Anomaly Detection rules for popular open-source components☆52Updated 2 years ago
- The Project can be used to integrate QRadar with MISP Threat Sharing Platform☆39Updated 2 years ago
- ☆51Updated 3 years ago
- Mapping NSM rules to MITRE ATT&CK☆71Updated 4 years ago
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆35Updated 2 years ago
- Cyber Threat Intelligence Data, Indicators, and Analysis☆85Updated 4 months ago
- zeek-scripts☆44Updated 6 years ago
- Suricata Verification Tests - Testing Suricata Output☆107Updated this week
- Suricata rules for network anomaly detection☆162Updated 3 weeks ago
- A library and command line tool for extracting indicators of compromise (IOCs) from security reports in PDF, HTML, Word, or text format☆31Updated 3 weeks ago
- ☆53Updated this week
- Collection of Suricata rule sets that I use modified to my environments.☆39Updated 4 years ago
- Sample programs to access the API☆81Updated 2 weeks ago
- Hands-On Network Forensics by Nipun Jaswal☆46Updated last year
- Suricata rules that can detect a wide range of threats, including malware, exploits, and other malicious activity especially web applicat…☆45Updated last year
- ☆51Updated 6 years ago
- A collection of resources for security data☆41Updated 7 years ago
- Cisco Orbital - Osquery queries by Talos☆131Updated 8 months ago
- Snorpy is a python script the gives a Gui interface to help those new to snort create rules.☆62Updated 8 months ago
- Extensible framework for analyzing publicly available information about vulnerabilities☆113Updated this week
- The FASTEST way to consume threat intel.☆68Updated 2 years ago
- This repository will hold PCAP IOC data related with known malware samples (owner: Bryant Smith)☆103Updated 3 years ago
- This program exports MITRE ATT&CK framework in ELK dashboard☆78Updated 2 years ago
- ☆45Updated last year
- A Ruleset to enhance detection capabilities of Ossec using Sysmon☆92Updated 3 years ago
- The Security Analyst’s Guide to Suricata☆56Updated 2 weeks ago