Collection of Snort 2/3 rules.
☆40Jun 22, 2018Updated 7 years ago
Alternatives and similar repositories for Snort-Rules
Users that are interested in Snort-Rules are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- aka GENESIDS: Reads and parses rules using a "snort like" syntax and generates and sends packets that trigger events in signature based I…☆23Nov 9, 2018Updated 7 years ago
- This is an open source Snort rules repository☆30May 31, 2022Updated 3 years ago
- Snort rule parser/validator written in python.☆20May 16, 2023Updated 2 years ago
- Function ID for Malware Analysis☆13Jul 6, 2020Updated 5 years ago
- Resources for I Want My EIP, presented at Derbycon 2017☆11Sep 23, 2017Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- DMRlink Socket-Based Monitoring☆13May 9, 2019Updated 6 years ago
- Snort_rules detection bad actors.☆29Aug 18, 2024Updated last year
- ☆12Mar 28, 2026Updated 2 weeks ago
- Pure python parser for Snort/Suricata rules.☆34Mar 13, 2024Updated 2 years ago
- ☆19Oct 23, 2020Updated 5 years ago
- Malware detonation platform Polygon integration☆10Aug 1, 2023Updated 2 years ago
- ☆12Jan 12, 2023Updated 3 years ago
- Automatically generates schema given json samples.☆10Jun 1, 2016Updated 9 years ago
- GitHub CVE Repository Hunt☆17Jul 23, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Klara docker compose☆11May 19, 2020Updated 5 years ago
- MutRex - A generator of fault detecting strings for regular expressions☆12Mar 18, 2024Updated 2 years ago
- A regular expression to SMT-LIB constraint translator☆12Jul 12, 2025Updated 9 months ago
- How to send structured Snort IDS alert logs into Graylog☆27Oct 20, 2025Updated 5 months ago
- CROSS PLATFORM MULTI NETCAT SERVER☆12Sep 17, 2025Updated 6 months ago
- Wersja hosts, PiHole, dnsmasq, domenowa (Forti Guard) filtrów KAD☆60Apr 8, 2026Updated last week
- ☆11May 18, 2021Updated 4 years ago
- Command line tool for macaddress.io API.☆12Dec 11, 2018Updated 7 years ago
- Polynomial arithmetic over GF2☆12Oct 30, 2018Updated 7 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A dk.brics FSM to regular-expression-string converter☆10Jul 12, 2025Updated 9 months ago
- Various Docker Compose profiles to set up TheHive and Cortex for different use cases☆17Feb 6, 2026Updated 2 months ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆17Apr 23, 2020Updated 5 years ago
- A Python script that generates Snort IDS rules from network packets☆24Oct 30, 2017Updated 8 years ago
- Windows API (WinAPI) functions and system calls with categories in JSON format, including arguments (SAL notation) and more.☆27Jun 11, 2025Updated 10 months ago
- ☆11Dec 30, 2020Updated 5 years ago
- Terraform Virtual Machine Module☆14Mar 14, 2025Updated last year
- An implementation of the NTRU encryption and decryption algorithm in Python 3☆15Sep 29, 2024Updated last year
- Study into generating POC / Exploits for the metasploit framework using LLMs☆13Aug 27, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Passive Reconnaissance Techniques Approach helps for penetration testing and bug bounty hunting by gathering information about a target s…☆20Aug 19, 2025Updated 7 months ago
- Sep0lkit's Blog☆14Apr 18, 2020Updated 5 years ago
- AlphaTracker is a computer vision pipeline with the practical and real-time advantages , which requires minimal hardware requirements and…☆12Jan 10, 2023Updated 3 years ago
- Scan outlook inbox with yara rules,APIs and IOCs☆14Aug 3, 2018Updated 7 years ago
- A Machine Learning based tool for identifying P2P (Peer To Peer) Bot-Nets using network traffic analysis, as well as detect the hosts inv…☆12Jan 4, 2023Updated 3 years ago
- YARA duplicate rule detection and removal. YARA rule index creation. YARA rule file merger.☆10Jan 19, 2026Updated 2 months ago
- A Windows REG file to enable all default PowerShell logging on a system with PowerShell v5 installed☆16Jun 20, 2016Updated 9 years ago