Suricata rules for network anomaly detection
☆183Feb 7, 2026Updated last month
Alternatives and similar repositories for hunting-rules
Users that are interested in hunting-rules are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Example Suricata rules implementing some of my detection tactics☆22Jan 13, 2023Updated 3 years ago
- Suricata rules for the new critical vulnerabilities☆85Jan 26, 2021Updated 5 years ago
- A tools to work on suricata stats.log file.☆30Oct 14, 2015Updated 10 years ago
- Mapping NSM rules to MITRE ATT&CK☆73Aug 29, 2020Updated 5 years ago
- Suricata rule and intel index☆33Mar 17, 2026Updated last week
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Quickly generate suricata rules for IOCs☆28Apr 30, 2021Updated 4 years ago
- Web Based Event Viewer (GUI) for Suricata EVE Events in Elastic Search☆486Updated this week
- Attack Detection☆1,360Aug 31, 2022Updated 3 years ago
- fast, extensible, versatile event router for Suricata's EVE-JSON format