Suricata rules for Emerging Threats and funkyness
☆75May 15, 2017Updated 8 years ago
Alternatives and similar repositories for Suricata-Signatures
Users that are interested in Suricata-Signatures are comparing it to the libraries listed below
Sorting:
- The OTX Suricata Rule Generator can be used to create the rules and configuration for Suricata to alert on indicators from your OTX accou…☆114Apr 26, 2024Updated last year
- Mass Suricata rules creator, from a list of domain☆14Sep 14, 2018Updated 7 years ago
- A rootkit implemented as a linux kernel module☆18May 2, 2015Updated 10 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Jul 3, 2017Updated 8 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Sep 17, 2019Updated 6 years ago
- An assortment of general guides I've currated for general teaching purposes focusing on red / blue team methodologies and tasks.☆13Feb 3, 2018Updated 8 years ago
- ☆35Dec 9, 2023Updated 2 years ago
- Print the strings of encoded printable characters in files☆12Jul 19, 2015Updated 10 years ago
- Suricata rules to detect Winnti communication☆16Mar 5, 2018Updated 8 years ago
- "HeaderScan" Burp Plugin☆16Apr 26, 2014Updated 11 years ago
- Pcaps for PeddleCheap and implant communication + script for interpreting and decrypting pcaps.☆17Nov 29, 2017Updated 8 years ago
- Quickly generate suricata rules for IOCs☆28Apr 30, 2021Updated 4 years ago
- An Ansible playbook for deploying the Suricata intrusion detection system and fetching Snort rules with Oinkmaster.☆17Oct 30, 2021Updated 4 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Jan 6, 2021Updated 5 years ago
- IronBee Rules☆18Dec 4, 2013Updated 12 years ago
- Suricata rule and intel index☆33Jan 13, 2026Updated last month
- Templates for Kibana/Logstash to use with Suricata IDPS☆81Mar 12, 2016Updated 9 years ago
- Brute forcer and shell deployer for WildFly☆100Mar 10, 2018Updated 7 years ago
- ☆17Jul 26, 2018Updated 7 years ago
- ☆48Jul 7, 2020Updated 5 years ago
- The Damn Vulnerable Router Firmware Project☆30Feb 5, 2018Updated 8 years ago
- Suricata Extreme Performance Tuning guide☆213Mar 15, 2018Updated 7 years ago
- A bunch of scripts used for network defense during competitions.☆15Apr 3, 2015Updated 10 years ago
- A few snippets to show how suricata stats can end up in Influx DB using logstash☆12Jul 11, 2016Updated 9 years ago
- TLS scanning component of OWASP PurpleTeam☆11Feb 8, 2023Updated 3 years ago
- Abusing Self-XSS and Clickjacking to trigger XSS☆136Mar 18, 2017Updated 8 years ago
- Static Binary Deployer. Download and deploy *Nix utilities on a compromised system.☆27Jan 6, 2020Updated 6 years ago
- Meer (GPLv2) is a dedicated "spooler" for the Suricata & Sagan EVE output formats.☆23Feb 9, 2021Updated 5 years ago
- psychoPATH - hunting file uploads & LFI in the dark. This tool is a customisable payload generator designed for blindly detecting LFI & w…☆140May 25, 2017Updated 8 years ago
- A weaponized version of CVE-2018-9206☆62Oct 30, 2018Updated 7 years ago
- Endpoint for Out-of-Band Exfiltration (DNS & HTTP)☆93Nov 9, 2018Updated 7 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆88May 8, 2018Updated 7 years ago
- ☆32Apr 29, 2017Updated 8 years ago
- Linux Automatic ARP (TCP / UDP / ICMP) Firewall☆83Oct 24, 2019Updated 6 years ago
- Simple, useful scripts for red/blue team situations☆22May 4, 2015Updated 10 years ago
- 获取系统KB补丁对于的MS号☆24Aug 18, 2019Updated 6 years ago
- CORS checking☆34Jul 16, 2018Updated 7 years ago
- Metasploit framework via HTTP services☆10Jul 31, 2021Updated 4 years ago
- CGNAT em dispositivos baseados em RouterOS☆12May 14, 2019Updated 6 years ago