xisafe / suricata-ruleLinks
suricata IDS的规则,测试在用的,部分自写的规则视情况放出。
☆18Updated 6 years ago
Alternatives and similar repositories for suricata-rule
Users that are interested in suricata-rule are comparing it to the libraries listed below
Sorting:
- 天御攻防实验室 - 威胁猎杀实战系列☆102Updated 6 years ago
- 《横向移动攻击与检测技术》专栏文章☆17Updated 6 years ago
- ☆57Updated 4 years ago
- ThreatHound is a threat intelligence query tool use for detecting potentially malicious IP or domains. It combines the MISP open source t…☆40Updated 5 years ago
- A simple web platform for WatchAD☆110Updated 2 years ago
- ☆30Updated 2 years ago
- Suricata安装部署&丢包优化&性能调优&规则调整&Pfring设置☆142Updated 6 years ago
- nmap service and application version detection (without nmap installation)☆115Updated 7 years ago
- tcppc: A simple honeypot to capture TCP/TLS/UDP payloads on ALL ports.☆36Updated 5 years ago
- Audit your acl of network device☆34Updated 5 years ago
- ☆39Updated last year
- Linux命令转发记录☆64Updated 6 years ago
- Automatic reversed shell detecting and defensing☆52Updated 7 years ago
- ☆21Updated 7 years ago
- A golang client of our webshell scanner API☆28Updated 7 years ago
- Suricata rules for the new critical vulnerabilities☆83Updated 4 years ago
- ☆57Updated last year
- 自动化被动扫描系统分为数据源、数据处理、漏洞验证等三个子系统,本系统属于数据处理部分,抓取流量镜像的数据,进行分析过滤去重等操作,发送至消息队列中,等待PassiveSecCheck消费☆34Updated 7 years ago
- Code snippet accompanying blog post☆30Updated 10 years ago
- webshell and nonwebshell samples,which can be used to train machine learning models to detect webshell☆43Updated 6 years ago
- A Solution For Cross-Platform Obfuscated Commands Detection presented on CIS2019 China. 动静态Bash/CMD/PowerShell命令混淆检测框架 - CIS 2019大会☆165Updated 6 years ago
- 威胁情报采集系统☆33Updated 2 years ago
- ☆106Updated 7 years ago
- A powerful hacker toolkit collected more than 10 categories of open source scanners from Github - 安全行业从业者自研开源扫描器合辑☆18Updated last year
- Some security scripts i used☆15Updated 4 years ago
- HIDS全称是Host-based Intrusion Detection System,即基于主机型入侵检测系统,HIDS运行依赖这样一个原理:一个成功的入侵者一般而言都会留下他们入侵的痕迹。本人更倾向于通过记录主机的重要信息变更来发现入侵者。 本项目由两部分组成:一部分…☆106Updated 7 years ago
- Tool for tunnel (Version 2)☆190Updated 4 years ago
- 恶意脚本检测分类工具☆40Updated 4 years ago
- SDL China☆33Updated 6 years ago
- SQL injection detection engine built on of SQL tokenizing and syntax analysis written in C☆61Updated 5 years ago