suricata rules
☆18Dec 26, 2024Updated last year
Alternatives and similar repositories for suricata-rules
Users that are interested in suricata-rules are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Anomaly Detection using SH-ESD☆10Feb 6, 2019Updated 7 years ago
- Low-interaction Postgres Honeypot☆20May 20, 2024Updated last year
- Ripple20 Critical Vulnerabilities - Detection Logic and Signatures☆12May 28, 2021Updated 4 years ago
- WooYun Drops Markdown☆14Jun 28, 2020Updated 5 years ago
- everything about llm based agent☆24Dec 19, 2025Updated 3 months ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Writing Your Own Ticket to the Cloud Like APT: A Deep-dive to AD FS Attacks, Detections, and Mitigations☆12Dec 9, 2022Updated 3 years ago
- ☆12Mar 18, 2026Updated last week
- Intel® Generic Implementation of LAGraph* for Go*☆11Feb 23, 2026Updated last month
- suricata IDS的规则,测试在用 的,部分自写的规则视情况放出。☆18Apr 16, 2019Updated 6 years ago
- Application and service identification rules for Suricata☆19Nov 7, 2022Updated 3 years ago
- Crowdstrike Falcon Host script for iterating through instances to get alert and other relevant data☆13Jul 16, 2019Updated 6 years ago
- Speak raspberry pi`s ip address.☆10Oct 6, 2016Updated 9 years ago
- keras2+tensorflow+jupyter+flask+openslide+node+npm+gpu☆18Dec 1, 2017Updated 8 years ago
- Docker image to download and update most recent FireHOL IP list☆12Feb 12, 2019Updated 7 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- A simple Docker setup for a Flask application on Nginx☆15Jul 11, 2020Updated 5 years ago
- Honeypot detection toolkit☆11Feb 10, 2026Updated last month
- A Python 3 library to interact with VirusShare API v2.☆17Aug 12, 2020Updated 5 years ago
- Cobalt Strike teamserver detection.☆16Apr 26, 2021Updated 4 years ago
- A reverse proxy which validates access using JWT.☆12Mar 22, 2023Updated 3 years ago
- Dockerization of brat application☆13Jun 13, 2018Updated 7 years ago
- A curated list of awesome projects, libraries, and tools for MedSec.☆19Mar 22, 2019Updated 7 years ago
- Logbook for Digital Forensics and Incident Response☆11Jan 21, 2022Updated 4 years ago
- ☆14Oct 28, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Orchestrate gatherer, scanner, saver, and trustymail_reporter☆19Mar 11, 2026Updated 2 weeks ago
- A trusted AI Model Context Protocol (MCP) runtime for secure, decentralized AI tools and services.☆22Mar 7, 2026Updated 2 weeks ago
- ☆16Feb 25, 2022Updated 4 years ago
- Packer Config and Build Script for Ubuntu 22.04 Jammy Jellyfish☆21Apr 20, 2022Updated 3 years ago
- The Auditd Framework logs and applies security policy to linux auditd data☆15Jan 26, 2018Updated 8 years ago
- Eclipse Layout Kernel - Test models☆20Aug 16, 2024Updated last year
- Suricata rules for network anomaly detection☆183Feb 7, 2026Updated last month
- rclone encryption demo☆13Jun 2, 2020Updated 5 years ago
- Windows 10 console application that creates and monitors a mobile WiFi hotspot☆17Oct 6, 2023Updated 2 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Asynchronous API over asynchronous tasks samples - Celery, Redis, Flask, Flask-RESTPlus, Jobtastic☆10Sep 13, 2022Updated 3 years ago
- Virtual Lab builder and player☆15Aug 25, 2021Updated 4 years ago
- Built a mini HoneyNet in Azure and ingest log sources from various resources into a Log Analytics workspace☆24Jul 19, 2023Updated 2 years ago
- A collection of open source threat detection rules created by Cyber Castle's team.☆14Jun 2, 2022Updated 3 years ago
- 以子域名作为基础数据进行分析出关键词,然后基于FoFa、Shodan、Zoomye网络引擎的多维度资产探测脚本☆21Apr 25, 2021Updated 4 years ago
- WxappRevealer 是一款跨平台、独立可执行的命令行工具,专注于对 WeChat 小程序(`.wxapkg`)的智能反编译与敏感信息检索☆28Dec 12, 2025Updated 3 months ago
- The FASTEST way to parse Email☆18Dec 24, 2021Updated 4 years ago