suricata rules
☆19Dec 26, 2024Updated last year
Alternatives and similar repositories for suricata-rules
Users that are interested in suricata-rules are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Anomaly Detection using SH-ESD☆10Feb 6, 2019Updated 7 years ago
- Ripple20 Critical Vulnerabilities - Detection Logic and Signatures☆12May 28, 2021Updated 4 years ago
- A portable Go module for iSCSI operations.☆11Feb 23, 2026Updated 2 months ago
- everything about llm based agent☆24Dec 19, 2025Updated 4 months ago
- Writing Your Own Ticket to the Cloud Like APT: A Deep-dive to AD FS Attacks, Detections, and Mitigations☆12Dec 9, 2022Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Intel® Generic Implementation of LAGraph* for Go*☆11Feb 23, 2026Updated 2 months ago
- ☆16May 3, 2024Updated 2 years ago
- Application and service identification rules for Suricata☆18Nov 7, 2022Updated 3 years ago
- Crowdstrike Falcon Host script for iterating through instances to get alert and other relevant data☆13Jul 16, 2019Updated 6 years ago
- keras2+tensorflow+jupyter+flask+openslide+node+npm+gpu☆18Dec 1, 2017Updated 8 years ago
- Suricata rules for SCADA☆16Jun 4, 2022Updated 3 years ago
- ☆10Aug 8, 2017Updated 8 years ago
- Docker image to download and update most recent FireHOL IP list☆12Feb 12, 2019Updated 7 years ago
- Statistics parsing for suricata☆18Nov 14, 2013Updated 12 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆19Jun 6, 2017Updated 8 years ago
- A simple Docker setup for a Flask application on Nginx☆15Jul 11, 2020Updated 5 years ago
- A Python 3 library to interact with VirusShare API v2.☆17Aug 12, 2020Updated 5 years ago
- ☆14Jun 27, 2020Updated 5 years ago
- Dockerization of brat application☆13Jun 13, 2018Updated 7 years ago
- A curated list of awesome projects, libraries, and tools for MedSec.☆19Mar 22, 2019Updated 7 years ago
- Logbook for Digital Forensics and Incident Response☆11Jan 21, 2022Updated 4 years ago
- A package for R that bundles several Shiny web applications for educational use.☆13Feb 12, 2020Updated 6 years ago
- ☆14Oct 28, 2020Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Orchestrate gatherer, scanner, saver, and trustymail_reporter☆20Apr 22, 2026Updated 2 weeks ago
- A trusted AI Model Context Protocol (MCP) runtime for secure, decentralized AI tools and services.☆22Apr 28, 2026Updated last week
- ☆16Feb 25, 2022Updated 4 years ago
- The Auditd Framework logs and applies security policy to linux auditd data☆15Jan 26, 2018Updated 8 years ago
- Eclipse Layout Kernel - Test models☆20Aug 16, 2024Updated last year
- Suricata rules for network anomaly detection☆182Apr 14, 2026Updated 3 weeks ago
- rclone encryption demo☆13Jun 2, 2020Updated 5 years ago
- This guide helps you create an automated Earth Observation pipeline on AWS using S3 data delivery.☆10Feb 19, 2025Updated last year
- a tool to access private Github repositories within Docker☆18Jul 2, 2021Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Asynchronous API over asynchronous tasks samples - Celery, Redis, Flask, Flask-RESTPlus, Jobtastic☆10Sep 13, 2022Updated 3 years ago
- Docker based honeypot (Dionaea & Kippo)☆26Mar 21, 2015Updated 11 years ago
- Built a mini HoneyNet in Azure and ingest log sources from various resources into a Log Analytics workspace☆24Jul 19, 2023Updated 2 years ago
- A collection of open source threat detection rules created by Cyber Castle's team.☆14Jun 2, 2022Updated 3 years ago
- 以子域名作为基础数据进行分析出关键词,然后基于FoFa、Shodan、Zoomye网络引擎的多维度资产探测脚本☆21Apr 25, 2021Updated 5 years ago
- Handy scripts developed and discussed on http://auditcasts.com☆19Aug 19, 2019Updated 6 years ago
- How to simulate an Iris drone using PX4 firmware using the PX4-FastRTPS bridge to communicate with a ROS2 program that controls the drone…☆10Oct 5, 2020Updated 5 years ago