travisbgreen / hunting-rules
Suricata rules for network anomaly detection
☆154Updated last month
Alternatives and similar repositories for hunting-rules:
Users that are interested in hunting-rules are comparing it to the libraries listed below
- This repository will hold PCAP IOC data related with known malware samples (owner: Bryant Smith)☆99Updated 3 years ago
- Suricata Verification Tests - Testing Suricata Output☆104Updated this week
- The OTX Suricata Rule Generator can be used to create the rules and configuration for Suricata to alert on indicators from your OTX accou…☆108Updated 8 months ago
- PCAP Samples for Different Post Exploitation Techniques☆351Updated 3 years ago
- Suricata Language Server is an implementation of the Language Server Protocol for Suricata signatures. It adds syntax check, hints and au…☆66Updated this week
- SIEGMA - Transform Sigma rules into SIEM consumables☆146Updated last year
- A Ruleset to enhance detection capabilities of Ossec using Sysmon☆87Updated 2 years ago
- S2AN - Mapper of Sigma/Suricata Rules/Signatures ➡️ MITRE ATT&CK Navigator☆85Updated 2 years ago
- Mapping NSM rules to MITRE ATT&CK☆68Updated 4 years ago
- SIGMA UI is a free open-source application based on the Elastic stack and Sigma Converter (sigmac)☆184Updated 3 years ago
- Sigma rules from Joe Security☆202Updated 2 months ago
- Anything Sysmon related from the MSTIC R&D team☆148Updated 7 months ago
- Suricata rules for the new critical vulnerabilities☆80Updated 3 years ago
- Log Entry to Sigma Rule Converter☆107Updated 2 years ago
- Suricata, Snort and Zeek IDS rule and pcap testing system☆464Updated last week
- Collection of Suricata rule sets that I use modified to my environments.☆39Updated 4 years ago
- Open source endpoint agent providing host information to Zeek. [v2]☆72Updated 2 months ago
- 🚌 Threat Bus – A threat intelligence dissemination layer for open-source security tools.☆261Updated last year
- Zeek-Formatted Threat Intelligence Feeds☆347Updated this week
- Place for resources used during the Mordor Detection hackathon event featuring APT29 ATT&CK evals datasets☆133Updated 4 years ago
- Collection of various open-source an commercial rulesets for NIDS (especially for Suricata and Snort)☆23Updated last year
- Standard-Format Threat Intelligence Feeds☆105Updated this week
- Signature engine for all your logs☆165Updated last year
- The tool for updating your Suricata rules.☆262Updated last month
- ☆130Updated 11 months ago
- The Security Analyst’s Guide to Suricata☆53Updated 7 months ago
- PcapMonkey will provide an easy way to analyze pcap using the latest version of Suricata and Zeek.☆147Updated 10 months ago
- Import specific data sources into the Sigma generic and open signature format.☆77Updated 2 years ago
- Sysmon and wazuh integration with Sigma sysmon rules [updated]☆62Updated 3 years ago