thereisnotime / Snort-Rules
Collection of Snort 2/3 rules.
☆34Updated 6 years ago
Alternatives and similar repositories for Snort-Rules:
Users that are interested in Snort-Rules are comparing it to the libraries listed below
- Packet captures of malicious traffic for analysis using Wireshark☆57Updated last year
- ☆48Updated 6 years ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆75Updated 6 months ago
- Configuring the Suricata IDS to detect DoS attacks by adding custom rule file.☆39Updated 4 years ago
- Repository of creating different example suricata data sets☆32Updated 6 years ago
- ☆44Updated last year
- Sample programs to access the API☆76Updated last week
- Zeek Training Materials/Products☆37Updated 3 weeks ago
- Mapping NSM rules to MITRE ATT&CK☆69Updated 4 years ago
- Suricata rules for network anomaly detection☆155Updated this week
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆34Updated 2 years ago
- The Security Analyst’s Guide to Suricata☆54Updated 8 months ago
- This is an open source Snort rules repository☆30Updated 2 years ago
- This repository has been archived in favor of https://github.com/idaholab/Malcolm-Test-Artifacts☆33Updated 2 months ago
- Repo Filled With Follow Along Guides☆73Updated 2 years ago
- Open source endpoint agent providing host information to Zeek. [v2]☆75Updated 4 months ago
- zeek-scripts☆43Updated 6 years ago
- The FASTEST way to consume threat intel.☆67Updated last year
- Hands-On Network Forensics by Nipun Jaswal☆43Updated last year
- This is the ICSSIM source code and user manual for simulating industrial control system testbed for cybersecurity experiments☆69Updated 8 months ago
- Collection of Suricata rule sets that I use modified to my environments.☆39Updated 4 years ago
- Industrial Control Systems Network Protocol Parsers☆161Updated last month
- The Project can be used to integrate QRadar with MISP Threat Sharing Platform☆38Updated 2 years ago
- This program exports MITRE ATT&CK framework in ELK dashboard☆78Updated 2 years ago
- ☆48Updated 2 years ago
- Suricata Verification Tests - Testing Suricata Output☆104Updated this week
- The ICS Advisory Project is an open-source project to provide DHS CISA ICS Advisories data in Comma Separated Value (CSV) format to suppo…☆73Updated this week
- A Ruleset to enhance detection capabilities of Ossec using Sysmon☆88Updated 2 years ago
- A collection of resources for security data☆40Updated 7 years ago
- Cleanup of older MISP events can require some work until now☆25Updated 2 years ago