vncloudsco / suricata-rulesLinks
suricata rules
☆18Updated last year
Alternatives and similar repositories for suricata-rules
Users that are interested in suricata-rules are comparing it to the libraries listed below
Sorting:
- Suricata rules for network anomaly detection☆182Updated 2 months ago
- zeek-scripts☆45Updated 7 years ago
- Suricata rules for the new critical vulnerabilities☆85Updated 5 years ago
- Security event correlation engine for ELK stack☆448Updated last year
- A Ruleset to enhance detection capabilities of Ossec using Sysmon☆95Updated 3 years ago
- PcapMonkey will provide an easy way to analyze pcap using the latest version of Suricata and Zeek.☆163Updated 10 months ago
- Ripple20 Critical Vulnerabilities - Detection Logic and Signatures☆12Updated 4 years ago
- The tool for updating your Suricata rules.☆289Updated 3 months ago
- DynamiteNSM is a free Network Security Monitor developed by Dynamite Analytics to enable network visibility and advanced cyber threat det…☆172Updated 2 years ago
- ☆44Updated 3 years ago
- Zeek IDS Dockerfile☆101Updated 3 years ago
- The OTX Suricata Rule Generator can be used to create the rules and configuration for Suricata to alert on indicators from your OTX accou…☆113Updated last year
- Suricata Verification Tests - Testing Suricata Output☆118Updated last week
- Suricata Language Server is an implementation of the Language Server Protocol for Suricata signatures. It adds syntax check, hints and au…☆84Updated this week
- Incident Response - Fast suspicious file finder☆249Updated 2 weeks ago
- Wazuh - Ruleset☆502Updated last year
- ☆61Updated this week
- Open source endpoint agent providing host information to Zeek. [v2]☆90Updated 2 weeks ago
- Collection of Suricata rule sets that I use modified to my environments.☆39Updated 5 years ago
- Sagan is a multi-threads, high performance log analysis engine. At it's core, Sagan similar to Suricata/Snort but with logs rather th…☆191Updated 4 months ago
- Open Source SIEM (Security Information and Event Management system).☆219Updated 2 years ago
- Parse wazuh[HIDS] alerts into ECS mapping using Filebeat☆28Updated 5 years ago
- Scirius is a web application for Suricata ruleset management and threat hunting.☆675Updated last month
- Jimi is an automation first no-code platform designed and developed originally for Security Orchestration and Response. Since its launch …☆169Updated last year
- Standard-Format Threat Intelligence Feeds☆127Updated last week
- PatrowlHears - Vulnerability Intelligence Center / Exploits☆166Updated last week
- SIGMA UI is a free open-source application based on the Elastic stack and Sigma Converter (sigmac)☆189Updated 4 years ago
- 🚨ATTENTION🚨 The CVE mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here as…☆241Updated last year
- Open Source Security Information and event Management☆108Updated 10 years ago
- OpenCTI Docker deployment helpers☆219Updated last week