xisafe / suricata-ruleLinks
suricata IDS的规则,测试在用的,部分自写的规则视情况放出。
☆18Updated 6 years ago
Alternatives and similar repositories for suricata-rule
Users that are interested in suricata-rule are comparing it to the libraries listed below
Sorting:
- 天御攻防实验室 - 威胁猎杀实战系列☆102Updated 5 years ago
- ThreatHound is a threat intelligence query tool use for detecting potentially malicious IP or domains. It combines the MISP open source t…☆39Updated 5 years ago
- 《横向移动攻击与检测技术》专栏文章☆17Updated 5 years ago
- ☆9Updated 8 years ago
- tcppc: A simple honeypot to capture TCP/TLS/UDP payloads on ALL ports.☆35Updated 4 years ago
- nmap service and application version detection (without nmap installation)☆113Updated 7 years ago
- ☆30Updated 2 years ago
- Automatic reversed shell detecting and defensing☆51Updated 6 years ago
- Shell say no to NIDS☆71Updated 5 years ago
- Audit your acl of network device☆34Updated 4 years ago
- ☆37Updated last year
- 威胁检测规则集☆15Updated 5 years ago
- A Solution For Cross-Platform Obfuscated Commands Detection presented on CIS2019 China. 动静态Bash/CMD/PowerShell命令混淆检测框架 - CIS 2019大会☆165Updated 5 years ago
- Att&ck Cloud相关☆21Updated 4 years ago
- A golang client of our webshell scanner API☆28Updated 7 years ago
- 恶意脚本检测分类工具☆40Updated 4 years ago
- ☆21Updated 7 years ago
- Oops, It's funny to detect a webshell. Temporarily not maintained☆18Updated 7 years ago
- Code snippet accompanying blog post☆30Updated 9 years ago
- Explore Indicators of Compromise Automatically☆94Updated 5 years ago
- 奇安信报开源软件漏洞cve所用目录。每个人报漏洞请建立自己的目录。☆45Updated 5 years ago
- 一个HIDS agent端的demo☆17Updated 5 years ago
- 17条检测cobaltstrike的suricata-ids规则☆66Updated 2 years ago
- ☆56Updated 4 years ago
- ☆11Updated 5 years ago
- ICSwiki☆26Updated 4 years ago
- SDL China☆33Updated 6 years ago
- ☆45Updated 3 years ago
- 数据库和其他服务的弱端口的弱口令检测以及未授权访问的集成检测工具。 Weak password blasting of weak ports and integrated detection tools for unauthorized access.☆133Updated 5 years ago
- ☆38Updated 4 years ago