Collection of Snort 2/3 rules.
☆40Jun 22, 2018Updated 7 years ago
Alternatives and similar repositories for Snort-Rules
Users that are interested in Snort-Rules are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- aka GENESIDS: Reads and parses rules using a "snort like" syntax and generates and sends packets that trigger events in signature based I…☆23Nov 9, 2018Updated 7 years ago
- Snort rule parser/validator written in python.☆20May 16, 2023Updated 2 years ago
- Resources for I Want My EIP, presented at Derbycon 2017☆11Sep 23, 2017Updated 8 years ago
- DMRlink Socket-Based Monitoring☆13May 9, 2019Updated 6 years ago
- Snort_rules detection bad actors.☆29Aug 18, 2024Updated last year
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Winamp-style MP3 player for M5Stack Cardputer-Adv with ES8311 audio codec support☆26Mar 1, 2026Updated 2 months ago
- ☆12Mar 28, 2026Updated last month
- Development repository for the passenger_apache2 cookbook☆37Apr 20, 2026Updated 2 weeks ago
- ☆20Oct 23, 2020Updated 5 years ago
- Malware detonation platform Polygon integration☆10Aug 1, 2023Updated 2 years ago
- for Windows Malware Analysis☆16May 14, 2020Updated 5 years ago
- Playground ESP32 -H2/H4** -C2 -C3 -C5 -C6 -C61 -S31 -P4 -P42** -P54**☆18Dec 12, 2025Updated 4 months ago
- ☆22Mar 16, 2020Updated 6 years ago
- GitHub CVE Repository Hunt☆17Jul 23, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- How to send structured Snort IDS alert logs into Graylog☆26Oct 20, 2025Updated 6 months ago
- Wersja hosts, PiHole, dnsmasq, domenowa (Forti Guard) filtrów KAD☆60Updated this week
- An advanced WiFi scanning and packet sniffing toolkit for the ESP32-C5, featuring a cyberpunk-inspired web interface.☆47Mar 1, 2025Updated last year
- Command line tool for macaddress.io API.☆12Dec 11, 2018Updated 7 years ago
- Midterm Project for the AI & Cybersecurity Course - University of New Haven☆18Apr 30, 2020Updated 6 years ago
- nmap nse script for scan a whole country☆13Jun 28, 2022Updated 3 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆17Apr 23, 2020Updated 6 years ago
- ETWNetMonv3 is simple C# code for Monitoring TCP Network Connection via ETW & ETWProcessMon/2 is for Monitoring Process/Thread/Memory/Ima…☆40Jun 6, 2023Updated 2 years ago
- A Python script that generates Snort IDS rules from network packets☆24Oct 30, 2017Updated 8 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Vulnerable LLM Application☆14Jan 1, 2024Updated 2 years ago
- Windows API (WinAPI) functions and system calls with categories in JSON format, including arguments (SAL notation) and more.☆28Jun 11, 2025Updated 10 months ago
- SNORT GUI: sniff sniffs the baddies and helps you setup SNORT ids in your network☆29Apr 6, 2026Updated last month
- ☆11Dec 30, 2020Updated 5 years ago
- Terraform Virtual Machine Module☆15Mar 14, 2025Updated last year
- Passive Reconnaissance Techniques Approach helps for penetration testing and bug bounty hunting by gathering information about a target s…☆20Aug 19, 2025Updated 8 months ago
- Sep0lkit's Blog☆13Apr 18, 2020Updated 6 years ago
- SDL3 project inspired by HamClock from Clear Sky Institute☆47Updated this week
- A Machine Learning based tool for identifying P2P (Peer To Peer) Bot-Nets using network traffic analysis, as well as detect the hosts inv…☆12Jan 4, 2023Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Scan outlook inbox with yara rules,APIs and IOCs☆14Aug 3, 2018Updated 7 years ago
- A list of OSINT resources and tools that may be useful when conducting investigations related to the Kingdom of Saudi Arabia☆14May 12, 2025Updated 11 months ago
- NMAP with LLM summaries☆16Jan 15, 2024Updated 2 years ago
- A Windows REG file to enable all default PowerShell logging on a system with PowerShell v5 installed☆16Jun 20, 2016Updated 9 years ago
- Collection of my network covert channel tools.☆17Mar 11, 2026Updated last month
- BitView's translations.☆11Sep 30, 2025Updated 7 months ago
- Free and opensource antivirus based on ClamAV.☆16Apr 12, 2024Updated 2 years ago