suricata IDS的规则,测试在用的,部分自写的规则视情况放出。
☆18Apr 16, 2019Updated 6 years ago
Alternatives and similar repositories for suricata-rule
Users that are interested in suricata-rule are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Statistics parsing for suricata☆18Nov 14, 2013Updated 12 years ago
- Community-based CybergON-powered Suricata rules☆12Jul 5, 2022Updated 3 years ago
- Collection of various open-source an commercial rulesets for NIDS (especially for Suricata and Snort)☆29Jul 24, 2023Updated 2 years ago
- A set of ICS IDS rules for use with Suricata.☆52Oct 13, 2023Updated 2 years ago
- Security information and event management, masters's diploma☆10Aug 3, 2015Updated 10 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Anomaly Detection using SH-ESD☆10Feb 6, 2019Updated 7 years ago
- Carving tool based in Radare2 & Yara☆16Oct 30, 2018Updated 7 years ago
- Yara matching in ElasticSearch.☆10Jun 12, 2018Updated 7 years ago
- Indicators of Compromise (IOCs) for malware we have researched☆11Aug 8, 2023Updated 2 years ago
- A tools to work on suricata stats.log file.☆30Oct 14, 2015Updated 10 years ago
- WooYun Drops Markdown☆14Jun 28, 2020Updated 5 years ago
- C# AV bypass jank☆35Feb 9, 2021Updated 5 years ago
- 获取可用全球公共dns,可用于域名爆破数据源☆11Nov 30, 2019Updated 6 years ago
- everything about llm based agent☆24Dec 19, 2025Updated 3 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Suricata IDS rules 用来检测红队渗透/恶意行为等,支持检测CobaltStrike/MSF/Empire/DNS隧道/Weevely/菜刀/冰蝎/挖矿/反弹shell/ICMP隧道等☆1,266Jul 8, 2023Updated 2 years ago
- suricata rules☆18Dec 26, 2024Updated last year
- Suricata rules for network anomaly detection☆183Feb 7, 2026Updated last month
- Application and service identification rules for Suricata☆19Nov 7, 2022Updated 3 years ago
- Safe wrappers for VFIO☆15Nov 30, 2021Updated 4 years ago
- blkinfo is a python package to list information about all available or the specified block devices.☆11Aug 6, 2023Updated 2 years ago
- DFIR notebooks GCIH Gold project, paper☆12Apr 30, 2015Updated 10 years ago
- keras2+tensorflow+jupyter+flask+openslide+node+npm+gpu☆18Dec 1, 2017Updated 8 years ago
- Suricata rules for SCADA☆16Jun 4, 2022Updated 3 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- ☆10Aug 8, 2017Updated 8 years ago
- Utility to collect metrics from MS SQL with queries and send it via zabbix_sender protocol☆11Apr 7, 2017Updated 8 years ago
- Alternative C# Implementation tool to retrieve Active Directory Integrated DNS records with IP addresses☆50Aug 8, 2020Updated 5 years ago
- Fast multipattern regular expression searching for digital forensics☆18Jul 31, 2019Updated 6 years ago
- Quickly generate suricata rules for IOCs☆28Apr 30, 2021Updated 4 years ago
- A library to automate the conversion of linux-based VMs to a set of docker containers☆14Apr 10, 2015Updated 10 years ago
- Atlassian Confluence Server 7.5.1 Pre-Authorization Arbitrary File Read vulnerability (CVE-2021-26085)☆14Oct 12, 2021Updated 4 years ago
- ☆14Jun 27, 2020Updated 5 years ago
- ☆11Jun 11, 2025Updated 9 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Snapshot of the vectorized MMU that lines up with the vectorized MMU blog☆23Apr 10, 2020Updated 5 years ago
- ipstatistics is a script based on the ipip library that is used to quickly filter the ip list.☆14Aug 21, 2020Updated 5 years ago
- to detect vulnerability scans, XSS and SQLI attacks, examine access log files for detections.☆11Aug 1, 2019Updated 6 years ago
- os fingerprint probe through smb☆10Jun 24, 2021Updated 4 years ago
- An example showing how to use multiple event loops in libuv. The loops run in two different threads, and the example also shows how threa…☆22Dec 7, 2012Updated 13 years ago
- Threat Hunting is time consuming enough as it is. Coming up with and tracking metrics to justify your hunt team to the Execs often takes…☆13Dec 7, 2022Updated 3 years ago
- ☆14Oct 28, 2020Updated 5 years ago