suricata rules
☆18Dec 26, 2024Updated last year
Alternatives and similar repositories for suricata-rules
Users that are interested in suricata-rules are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Anomaly Detection using SH-ESD☆10Feb 6, 2019Updated 7 years ago
- Low-interaction Postgres Honeypot☆20May 20, 2024Updated last year
- Ripple20 Critical Vulnerabilities - Detection Logic and Signatures☆12May 28, 2021Updated 4 years ago
- WooYun Drops Markdown☆14Jun 28, 2020Updated 5 years ago
- everything about llm based agent☆24Dec 19, 2025Updated 3 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Application and service identification rules for Suricata☆19Nov 7, 2022Updated 3 years ago
- Crowdstrike Falcon Host script for iterating through instances to get alert and other relevant data☆13Jul 16, 2019Updated 6 years ago
- keras2+tensorflow+jupyter+flask+openslide+node+npm+gpu☆18Dec 1, 2017Updated 8 years ago
- Suricata rules for SCADA☆16Jun 4, 2022Updated 3 years ago
- ☆10Aug 8, 2017Updated 8 years ago
- Statistics parsing for suricata☆18Nov 14, 2013Updated 12 years ago
- A simple Docker setup for a Flask application on Nginx☆15Jul 11, 2020Updated 5 years ago
- A Python 3 library to interact with VirusShare API v2.☆17Aug 12, 2020Updated 5 years ago
- OpenGL scene graph gfx api for NodeJS & Browser☆27Aug 7, 2014Updated 11 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Python code injection library☆10Jul 30, 2018Updated 7 years ago
- A reverse proxy which validates access using JWT.☆12Mar 22, 2023Updated 3 years ago
- A curated list of awesome projects, libraries, and tools for MedSec.☆19Mar 22, 2019Updated 7 years ago
- Logbook for Digital Forensics and Incident Response☆11Jan 21, 2022Updated 4 years ago
- Orchestrate gatherer, scanner, saver, and trustymail_reporter☆20Apr 6, 2026Updated last week
- ☆16Feb 25, 2022Updated 4 years ago
- Packer Config and Build Script for Ubuntu 22.04 Jammy Jellyfish☆21Apr 20, 2022Updated 3 years ago
- The Auditd Framework logs and applies security policy to linux auditd data☆15Jan 26, 2018Updated 8 years ago
- Eclipse Layout Kernel - Test models☆20Aug 16, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Suricata rules for network anomaly detection☆182Feb 7, 2026Updated 2 months ago
- rclone encryption demo☆13Jun 2, 2020Updated 5 years ago
- a tool to access private Github repositories within Docker☆18Jul 2, 2021Updated 4 years ago
- Asynchronous API over asynchronous tasks samples - Celery, Redis, Flask, Flask-RESTPlus, Jobtastic☆10Sep 13, 2022Updated 3 years ago
- Virtual Lab builder and player☆15Aug 25, 2021Updated 4 years ago
- Python3 script to quickly get various information from a domain controller through his LDAP service.☆14Jan 4, 2022Updated 4 years ago
- A collection of open source threat detection rules created by Cyber Castle's team.☆14Jun 2, 2022Updated 3 years ago
- Handy scripts developed and discussed on http://auditcasts.com☆19Aug 19, 2019Updated 6 years ago
- WxappRevealer 是一款跨平台、独立可执行的命令行工具,专注于对 WeChat 小程序(`.wxapkg`)的智能反编译与敏感信息检索☆28Dec 12, 2025Updated 4 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- The FASTEST way to parse Email☆18Dec 24, 2021Updated 4 years ago
- Collection of various open-source an commercial rulesets for NIDS (especially for Suricata and Snort)☆29Jul 24, 2023Updated 2 years ago
- Using docker swarm creating the replica of account-service micro service and load balancing the requests using haproxy docker container (…☆14Apr 20, 2019Updated 6 years ago
- We want to create a dashboard (with knowledge graphs) to visualize the network node communication situation based on the firewall logs to…☆16Oct 26, 2024Updated last year
- Source code for IMC replicability track☆16Oct 4, 2024Updated last year
- ☆33Jun 19, 2021Updated 4 years ago
- Welcome to the NCC Group Threat Intelligence Alert repo, here you will find the alerts which we have raised to our customers regarding in…☆25Feb 6, 2023Updated 3 years ago