thereisnotime / Snort-RulesLinks
Collection of Snort 2/3 rules.
☆40Updated 7 years ago
Alternatives and similar repositories for Snort-Rules
Users that are interested in Snort-Rules are comparing it to the libraries listed below
Sorting:
- ☆68Updated 7 years ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆82Updated 5 months ago
- Convert pcap files into richly-typed ZNG summary logs (Zeek, Suricata, and more)☆92Updated 8 months ago
- Open source endpoint agent providing host information to Zeek. [v2]☆90Updated last month
- Suricata rules for network anomaly detection☆181Updated last month
- ☆54Updated 2 years ago
- DynamiteNSM is a free Network Security Monitor developed by Dynamite Analytics to enable network visibility and advanced cyber threat det…☆172Updated 2 years ago
- Repository of creating different example suricata data sets☆36Updated 7 years ago
- Sagan is a multi-threads, high performance log analysis engine. At it's core, Sagan similar to Suricata/Snort but with logs rather th…☆189Updated 3 months ago
- ☆56Updated 3 years ago
- OpenCTI Python Client☆143Updated 2 months ago
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆38Updated 3 years ago
- Python scripts for Malware Bazaar☆157Updated last year
- The Security Analyst’s Guide to Suricata☆61Updated 8 months ago
- YAIDS - Yara-Based IDS - Yara as an Intrusion Detection System / Yet Another Intrusion Detection System - An Intrusion Detection System (…☆26Updated 3 years ago
- Sample programs to access the API☆99Updated last month
- Repository of all the sites related to infosec IP/Domain/Hash/SSL/etc OSINT and eventually will include more.☆70Updated 2 months ago
- Pure python parser for Snort/Suricata rules.☆33Updated last year
- Mapping NSM rules to MITRE ATT&CK☆73Updated 5 years ago
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆449Updated this week
- Snorpy is a python script the gives a Gui interface to help those new to snort create rules.☆64Updated last year
- The Project can be used to integrate QRadar with MISP Threat Sharing Platform☆40Updated 3 years ago
- Packet captures of malicious traffic for analysis using Wireshark☆64Updated 2 years ago
- Simple, effective, and modular package for parsing observables (indicators of compromise (IOCs), network data, and other, security relate…☆178Updated 2 years ago
- zeek-scripts☆45Updated 7 years ago
- Automated handling of data feeds for security teams☆146Updated 3 weeks ago
- Entropy scanner for Linux to detect packed or encrypted binaries related to malware. Finds malicious files and Linux processes and gives …☆167Updated last year
- Zeek-Formatted Threat Intelligence Feeds☆382Updated this week
- Threat Detection & Anomaly Detection rules for popular open-source components☆53Updated 3 years ago
- Repo Filled With Follow Along Guides☆80Updated 3 years ago