travisbgreen / hunting-rules
Suricata rules for network anomaly detection
☆155Updated this week
Alternatives and similar repositories for hunting-rules:
Users that are interested in hunting-rules are comparing it to the libraries listed below
- This repository will hold PCAP IOC data related with known malware samples (owner: Bryant Smith)☆100Updated 3 years ago
- PCAP Samples for Different Post Exploitation Techniques☆354Updated 3 years ago
- Suricata Verification Tests - Testing Suricata Output☆104Updated this week
- Anything Sysmon related from the MSTIC R&D team☆149Updated 8 months ago
- Mapping NSM rules to MITRE ATT&CK☆69Updated 4 years ago
- The OTX Suricata Rule Generator can be used to create the rules and configuration for Suricata to alert on indicators from your OTX accou…☆108Updated 9 months ago
- Suricata Language Server is an implementation of the Language Server Protocol for Suricata signatures. It adds syntax check, hints and au…☆67Updated last month
- Sigma rules from Joe Security☆206Updated 3 months ago
- Open source endpoint agent providing host information to Zeek. [v2]☆75Updated 4 months ago
- A Ruleset to enhance detection capabilities of Ossec using Sysmon☆88Updated 2 years ago
- Collection of Suricata rule sets that I use modified to my environments.☆39Updated 4 years ago
- PcapMonkey will provide an easy way to analyze pcap using the latest version of Suricata and Zeek.☆150Updated 11 months ago
- Log Entry to Sigma Rule Converter☆107Updated 2 years ago
- Collection of various open-source an commercial rulesets for NIDS (especially for Suricata and Snort)☆23Updated last year
- SIGMA UI is a free open-source application based on the Elastic stack and Sigma Converter (sigmac)☆185Updated 3 years ago
- The Security Analyst’s Guide to Suricata☆54Updated 8 months ago
- ☆160Updated 4 years ago
- 🚌 Threat Bus – A threat intelligence dissemination layer for open-source security tools.☆262Updated last year
- S2AN - Mapper of Sigma/Suricata Rules/Signatures ➡️ MITRE ATT&CK Navigator☆85Updated 2 years ago
- SIEGMA - Transform Sigma rules into SIEM consumables☆146Updated last year
- IOC from articles, tweets for archives☆313Updated last year
- Place for resources used during the Mordor Detection hackathon event featuring APT29 ATT&CK evals datasets☆134Updated 4 years ago
- The tool for updating your Suricata rules.☆265Updated 2 months ago
- ☆130Updated last year
- Live forensic artifacts collector☆165Updated 7 months ago
- simple YARA-based IOC scanner☆166Updated last week
- DynamiteNSM is a free Network Security Monitor developed by Dynamite Analytics to enable network visibility and advanced cyber threat det…☆170Updated last year
- Suricata rules for the new critical vulnerabilities☆80Updated 4 years ago
- Suricata, Snort and Zeek IDS rule and pcap testing system☆470Updated last month
- A curated list of awesome things related to TheHive & Cortex☆175Updated 3 years ago