travisbgreen / hunting-rules
Suricata rules for network anomaly detection
☆156Updated this week
Alternatives and similar repositories for hunting-rules:
Users that are interested in hunting-rules are comparing it to the libraries listed below
- This repository will hold PCAP IOC data related with known malware samples (owner: Bryant Smith)☆99Updated 3 years ago
- A Ruleset to enhance detection capabilities of Ossec using Sysmon☆91Updated 2 years ago
- Mapping NSM rules to MITRE ATT&CK☆69Updated 4 years ago
- Suricata Verification Tests - Testing Suricata Output☆105Updated this week
- PCAP Samples for Different Post Exploitation Techniques☆355Updated 3 years ago
- The OTX Suricata Rule Generator can be used to create the rules and configuration for Suricata to alert on indicators from your OTX accou…☆109Updated 10 months ago
- Suricata Language Server is an implementation of the Language Server Protocol for Suricata signatures. It adds syntax check, hints and au…☆68Updated 2 months ago
- Sigma rules from Joe Security☆207Updated 4 months ago
- Suricata rules for the new critical vulnerabilities☆81Updated 4 years ago
- 🚌 Threat Bus – A threat intelligence dissemination layer for open-source security tools.☆262Updated 2 years ago
- PcapMonkey will provide an easy way to analyze pcap using the latest version of Suricata and Zeek.☆151Updated last week
- ☆130Updated last year
- Anything Sysmon related from the MSTIC R&D team☆150Updated 9 months ago
- SIGMA UI is a free open-source application based on the Elastic stack and Sigma Converter (sigmac)☆186Updated 3 years ago
- SIEGMA - Transform Sigma rules into SIEM consumables☆149Updated 2 weeks ago
- S2AN - Mapper of Sigma/Suricata Rules/Signatures ➡️ MITRE ATT&CK Navigator☆85Updated 2 years ago
- Zeek-Formatted Threat Intelligence Feeds☆356Updated this week
- Open source endpoint agent providing host information to Zeek. [v2]☆77Updated 5 months ago
- Collection of Suricata rule sets that I use modified to my environments.☆39Updated 4 years ago
- Log Entry to Sigma Rule Converter☆107Updated 3 years ago
- simple YARA-based IOC scanner☆169Updated last month
- Collection of various open-source an commercial rulesets for NIDS (especially for Suricata and Snort)☆23Updated last year
- zeek-scripts☆44Updated 6 years ago
- Malware Sinkhole List in various formats☆103Updated 2 years ago
- Place for resources used during the Mordor Detection hackathon event featuring APT29 ATT&CK evals datasets☆137Updated 4 years ago
- ☆125Updated last year
- The Security Analyst’s Guide to Suricata☆54Updated 9 months ago
- How to Zeek Sysmon Logs!☆102Updated 3 years ago
- OASIS Cyber Threat Intelligence (CTI) TC: A repository for commonly used STIX objects in order to avoid needless duplication. https://gi…☆91Updated this week
- The tool for updating your Suricata rules.☆266Updated 3 months ago