thereisnotime / Snort-RulesLinks
Collection of Snort 2/3 rules.
☆36Updated 7 years ago
Alternatives and similar repositories for Snort-Rules
Users that are interested in Snort-Rules are comparing it to the libraries listed below
Sorting:
- A completely automated anomaly detector Zeek network flows files (conn.log).☆81Updated 10 months ago
- The Security Analyst’s Guide to Suricata☆56Updated last month
- ☆35Updated 5 months ago
- Suricata rules that can detect a wide range of threats, including malware, exploits, and other malicious activity especially web applicat…☆46Updated last year
- Extensible framework for analyzing publicly available information about vulnerabilities☆116Updated last month
- Cyber Threat Intelligence Data, Indicators, and Analysis☆90Updated last week
- Repository of creating different example suricata data sets☆34Updated 6 years ago
- ☆19Updated 3 years ago
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆35Updated 2 years ago
- Threat Detection & Anomaly Detection rules for popular open-source components☆52Updated 2 years ago
- Packet captures of malicious traffic for analysis using Wireshark☆59Updated last year
- Open source endpoint agent providing host information to Zeek. [v2]☆83Updated last week
- ☆55Updated this week
- Configuring the Suricata IDS to detect DoS attacks by adding custom rule file.☆39Updated 5 years ago
- Pure python parser for Snort/Suricata rules.☆33Updated last year
- Mapping NSM rules to MITRE ATT&CK☆71Updated 4 years ago
- The official Prelude SIEM GitHub of https://www.prelude-siem.org☆30Updated 9 years ago
- ☆51Updated 3 years ago
- ☆49Updated last year
- Collection of Suricata rule sets that I use modified to my environments.☆39Updated 4 years ago
- DynamiteNSM is a free Network Security Monitor developed by Dynamite Analytics to enable network visibility and advanced cyber threat det…☆170Updated 2 years ago
- An awesome list of resources on deception-based security with honeypots and honeytokens☆174Updated 6 months ago
- Convert Sigma rules to Wazuh rules☆67Updated last year
- Argus Sensor☆67Updated last month
- Collection of various open-source an commercial rulesets for NIDS (especially for Suricata and Snort)☆26Updated last year
- ☆28Updated 4 years ago
- A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the…☆62Updated 2 years ago
- ☆55Updated 6 years ago
- The Attacker IP Prioritizer(AIP) dynamically generates resource-friendly IPv4 blocklists from Zeek network flows.☆30Updated 7 months ago
- Tools for Wazuh by Juan C. Tello☆14Updated 3 years ago