thereisnotime / Snort-RulesLinks
Collection of Snort 2/3 rules.
☆36Updated 7 years ago
Alternatives and similar repositories for Snort-Rules
Users that are interested in Snort-Rules are comparing it to the libraries listed below
Sorting:
- The Security Analyst’s Guide to Suricata☆58Updated 4 months ago
- ☆56Updated 6 years ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆81Updated 3 weeks ago
- ☆36Updated last month
- Sagan is a multi-threads, high performance log analysis engine. At it's core, Sagan similar to Suricata/Snort but with logs rather th…☆186Updated last week
- Packet captures of malicious traffic for analysis using Wireshark☆60Updated 2 years ago
- Open source endpoint agent providing host information to Zeek. [v2]☆85Updated 2 weeks ago
- Sample programs to access the API☆89Updated 4 months ago
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆35Updated 3 years ago
- The official Prelude SIEM GitHub of https://www.prelude-siem.org☆33Updated 9 years ago
- ☆53Updated 3 years ago
- This repository has been archived in favor of https://github.com/idaholab/Malcolm-Test-Artifacts☆37Updated 8 months ago
- DynamiteNSM is a free Network Security Monitor developed by Dynamite Analytics to enable network visibility and advanced cyber threat det…☆171Updated 2 years ago
- Cyber Threat Intelligence Data, Indicators, and Analysis☆95Updated last month
- Collection of various open-source an commercial rulesets for NIDS (especially for Suricata and Snort)☆28Updated 2 years ago
- Suricata rules for network anomaly detection☆168Updated 4 months ago
- Pure python parser for Snort/Suricata rules.☆33Updated last year
- Threat Detection & Anomaly Detection rules for popular open-source components☆53Updated 3 years ago
- Suricata rules that can detect a wide range of threats, including malware, exploits, and other malicious activity especially web applicat…☆51Updated last year
- Open Source SIEM (Security Information and Event Management system).☆217Updated 2 years ago
- Configuring the Suricata IDS to detect DoS attacks by adding custom rule file.☆39Updated 5 years ago
- zeek-scripts☆44Updated 6 years ago
- Convert pcap files into richly-typed ZNG summary logs (Zeek, Suricata, and more)☆87Updated 4 months ago
- Collection of Suricata rule sets that I use modified to my environments.☆39Updated 4 years ago
- ☆51Updated last year
- Import CrowdStrike Threat Intelligence into your instance of MISP☆48Updated 2 months ago
- Convert Sigma rules to Wazuh rules☆67Updated last year
- This is an open source Snort rules repository☆30Updated 3 years ago
- The Project can be used to integrate QRadar with MISP Threat Sharing Platform☆39Updated 3 years ago
- pcaps of traffic for traffic analysis workshop☆84Updated 3 years ago