travisbgreen / hunting-rulesLinks
Suricata rules for network anomaly detection
☆164Updated 2 months ago
Alternatives and similar repositories for hunting-rules
Users that are interested in hunting-rules are comparing it to the libraries listed below
Sorting:
- Mapping NSM rules to MITRE ATT&CK☆71Updated 4 years ago
- The OTX Suricata Rule Generator can be used to create the rules and configuration for Suricata to alert on indicators from your OTX accou…☆110Updated last year
- PCAP Samples for Different Post Exploitation Techniques☆363Updated 4 years ago
- This repository will hold PCAP IOC data related with known malware samples (owner: Bryant Smith)☆104Updated 3 years ago
- Suricata Verification Tests - Testing Suricata Output☆109Updated this week
- A Ruleset to enhance detection capabilities of Ossec using Sysmon☆93Updated 3 years ago
- 🚌 Threat Bus – A threat intelligence dissemination layer for open-source security tools.☆262Updated 2 years ago
- Suricata, Snort and Zeek IDS rule and pcap testing system☆480Updated last month
- SIEGMA - Transform Sigma rules into SIEM consumables☆151Updated 3 months ago
- Log Entry to Sigma Rule Converter☆108Updated 3 years ago
- PcapMonkey will provide an easy way to analyze pcap using the latest version of Suricata and Zeek.☆153Updated 2 months ago
- Open source endpoint agent providing host information to Zeek. [v2]☆83Updated this week
- Collection of various open-source an commercial rulesets for NIDS (especially for Suricata and Snort)☆26Updated last year
- Sigma rules from Joe Security☆216Updated 7 months ago
- S2AN - Mapper of Sigma/Suricata Rules/Signatures ➡️ MITRE ATT&CK Navigator☆87Updated 2 years ago
- ☆130Updated last year
- Suricata Language Server is an implementation of the Language Server Protocol for Suricata signatures. It adds syntax check, hints and au…☆72Updated this week
- Zeek-Formatted Threat Intelligence Feeds☆368Updated this week
- simple YARA-based IOC scanner☆169Updated 4 months ago
- Collecting & Hunting for IOCs with gusto and style☆240Updated 3 years ago
- Suricata rules for the new critical vulnerabilities☆82Updated 4 years ago
- SIGMA UI is a free open-source application based on the Elastic stack and Sigma Converter (sigmac)☆188Updated 4 years ago
- The Security Analyst’s Guide to Suricata☆56Updated last month
- DynamiteNSM is a free Network Security Monitor developed by Dynamite Analytics to enable network visibility and advanced cyber threat det…☆170Updated 2 years ago
- Collection of Suricata rule sets that I use modified to my environments.☆39Updated 4 years ago
- Anything Sysmon related from the MSTIC R&D team☆153Updated last year
- ☆126Updated last year
- Signature engine for all your logs☆170Updated last year
- The tool for updating your Suricata rules.☆273Updated last week
- zeek-scripts☆43Updated 6 years ago