thereisnotime / Snort-RulesLinks
Collection of Snort 2/3 rules.
☆36Updated 7 years ago
Alternatives and similar repositories for Snort-Rules
Users that are interested in Snort-Rules are comparing it to the libraries listed below
Sorting:
- A completely automated anomaly detector Zeek network flows files (conn.log).☆82Updated 11 months ago
- ☆51Updated 3 years ago
- Threat Detection & Anomaly Detection rules for popular open-source components☆52Updated 2 years ago
- The Project can be used to integrate QRadar with MISP Threat Sharing Platform☆39Updated 3 years ago
- Cyber Threat Intelligence Data, Indicators, and Analysis☆91Updated last month
- Sample programs to access the API☆86Updated 2 months ago
- This repository has been archived in favor of https://github.com/idaholab/Malcolm-Test-Artifacts☆36Updated 7 months ago
- ☆57Updated 6 years ago
- Hands-On Network Forensics by Nipun Jaswal☆48Updated 2 years ago
- Suricata rules for network anomaly detection☆165Updated 3 months ago
- STIX 2.1 Visualizer, Attack and Activity Thread Graph for Threat Modeling☆33Updated 7 months ago
- The Security Analyst’s Guide to Suricata☆56Updated 2 months ago
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆35Updated 2 years ago
- Sagan is a multi-threads, high performance log analysis engine. At it's core, Sagan similar to Suricata/Snort but with logs rather th…☆179Updated 3 months ago
- ☆55Updated last week
- A curated list of awesome things related to Suricata☆181Updated 4 months ago
- ☆19Updated 3 years ago
- This is the ICSSIM source code and user manual for simulating industrial control system testbed for cybersecurity experiments☆78Updated last year
- Convert Sigma rules to Wazuh rules☆67Updated last year
- Configuring the Suricata IDS to detect DoS attacks by adding custom rule file.☆39Updated 5 years ago
- Convert pcap files into richly-typed ZNG summary logs (Zeek, Suricata, and more)☆82Updated 2 months ago
- Zeek Training Materials/Products☆38Updated last month
- DynamiteNSM is a free Network Security Monitor developed by Dynamite Analytics to enable network visibility and advanced cyber threat det…☆170Updated 2 years ago
- ☆35Updated 5 months ago
- High Interaction Honeypot Solution for Redis protocol☆24Updated 4 years ago
- Mapping NSM rules to MITRE ATT&CK☆71Updated 4 years ago
- ☆28Updated 4 years ago
- A Ruleset to enhance detection capabilities of Ossec using Sysmon☆94Updated 3 years ago
- Zeek-Formatted Threat Intelligence Feeds☆374Updated this week
- Repository of creating different example suricata data sets☆34Updated 6 years ago