thereisnotime / Snort-Rules
Collection of Snort 2/3 rules.
☆32Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for Snort-Rules
- ☆44Updated 6 years ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆74Updated 3 months ago
- Suricata rules for network anomaly detection☆154Updated 2 months ago
- Configuring the Suricata IDS to detect DoS attacks by adding custom rule file.☆39Updated 4 years ago
- The Security Analyst’s Guide to Suricata☆52Updated 5 months ago
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆35Updated 2 years ago
- zeek-scripts☆41Updated 5 years ago
- Zeek Training Materials/Products☆35Updated last month
- Snorpy is a python script the gives a Gui interface to help those new to snort create rules.☆60Updated 3 months ago
- Collection of Suricata rule sets that I use modified to my environments.☆39Updated 4 years ago
- ☆46Updated 2 years ago
- ☆29Updated this week
- Sagan is a multi-threads, high performance log analysis engine. At it's core, Sagan similar to Suricata/Snort but with logs rather th…☆159Updated last week
- A Python script that generates Snort IDS rules from network packets☆25Updated 7 years ago
- Repository of all the sites related to infosec IP/Domain/Hash/SSL/etc OSINT and eventually will include more.☆65Updated 6 months ago
- Plugin providing native AF_Packet support for Zeek.☆33Updated 7 months ago
- Open source endpoint agent providing host information to Zeek. [v2]☆68Updated last month
- DynamiteNSM is a free Network Security Monitor developed by Dynamite Analytics to enable network visibility and advanced cyber threat det…☆164Updated last year
- Collection of various open-source an commercial rulesets for NIDS (especially for Suricata and Snort)☆20Updated last year
- Hands-On Network Forensics by Nipun Jaswal☆41Updated last year
- Threat Detection & Anomaly Detection rules for popular open-source components☆50Updated 2 years ago
- The Project can be used to integrate QRadar with MISP Threat Sharing Platform☆39Updated 2 years ago
- Pure python parser for Snort/Suricata rules.☆27Updated 8 months ago
- Zeek support for Community ID flow hashing.☆34Updated last year
- System for network traffic analysis and anomaly detection.☆87Updated 3 weeks ago
- Packet captures of malicious traffic for analysis using Wireshark☆54Updated last year
- A python app to predict Att&ck tactics and techniques from cyber threat reports☆116Updated last year
- Mapping NSM rules to MITRE ATT&CK☆68Updated 4 years ago
- Repository of creating different example suricata data sets☆32Updated 5 years ago
- Suricata Verification Tests - Testing Suricata Output☆102Updated 2 weeks ago