thereisnotime / Snort-Rules
Collection of Snort 2/3 rules.
☆35Updated 6 years ago
Alternatives and similar repositories for Snort-Rules:
Users that are interested in Snort-Rules are comparing it to the libraries listed below
- A completely automated anomaly detector Zeek network flows files (conn.log).☆76Updated 7 months ago
- Suricata rules for network anomaly detection☆156Updated last week
- Suricata rules that can detect a wide range of threats, including malware, exploits, and other malicious activity especially web applicat…☆43Updated 11 months ago
- ☆49Updated 6 years ago
- Open source endpoint agent providing host information to Zeek. [v2]☆77Updated 5 months ago
- Hands-On Network Forensics by Nipun Jaswal☆46Updated last year
- Mapping NSM rules to MITRE ATT&CK☆70Updated 4 years ago
- ☆27Updated 4 years ago
- Zeek Training Materials/Products☆37Updated last month
- ☆68Updated 7 months ago
- ☆52Updated this week
- The Security Analyst’s Guide to Suricata☆54Updated 9 months ago
- Sample programs to access the API☆80Updated last week
- Threat Detection & Anomaly Detection rules for popular open-source components☆51Updated 2 years ago
- zeek-scripts☆44Updated 6 years ago
- This repository has been archived in favor of https://github.com/idaholab/Malcolm-Test-Artifacts☆33Updated 3 months ago
- ☆51Updated 3 years ago
- Configuring the Suricata IDS to detect DoS attacks by adding custom rule file.☆39Updated 4 years ago
- A collection of resources for security data☆41Updated 7 years ago
- Zeek-Formatted Threat Intelligence Feeds☆358Updated this week
- ☆33Updated 2 months ago
- Repository of creating different example suricata data sets☆34Updated 6 years ago
- A curated repository of incident response playbooks☆74Updated last year
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆35Updated 2 years ago
- Snorpy is a python script the gives a Gui interface to help those new to snort create rules.☆61Updated 7 months ago
- Cyber Threat Intelligence Data, Indicators, and Analysis☆84Updated 3 months ago
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆62Updated 11 months ago
- Convert Sigma rules to Wazuh rules☆64Updated 11 months ago
- Sagan is a multi-threads, high performance log analysis engine. At it's core, Sagan similar to Suricata/Snort but with logs rather th…☆166Updated 2 weeks ago
- BlackBerry Threat Research & Intelligence☆98Updated last year