xisafe / suricata-rule
suricata IDS的规则,测试在用的,部分自写的规则视情况放出。
☆18Updated 5 years ago
Alternatives and similar repositories for suricata-rule:
Users that are interested in suricata-rule are comparing it to the libraries listed below
- 《横向移动攻击与检测技术》专栏文章☆16Updated 5 years ago
- 天御攻防实验室 - 威胁猎杀实战系列☆102Updated 5 years ago
- ThreatHound is a threat intelligence query tool use for detecting potentially malicious IP or domains. It combines the MISP open source t…☆39Updated 5 years ago
- A golang client of our webshell scanner API☆28Updated 7 years ago
- ☆9Updated 8 years ago
- Att&ck Cloud相关☆21Updated 4 years ago
- tcppc: A simple honeypot to capture TCP/TLS/UDP payloads on ALL ports.☆35Updated 4 years ago
- nmap service and application version detection (without nmap installation)☆113Updated 7 years ago
- Code snippet accompanying blog post☆29Updated 9 years ago
- Automatic reversed shell detecting and defensing☆51Updated 6 years ago
- Audit your acl of network device☆34Updated 4 years ago
- 威胁检测规则集☆15Updated 5 years ago
- 一个HIDS agent端的demo☆17Updated 5 years ago
- Shell say no to NIDS☆71Updated 5 years ago
- ☆30Updated last year
- ATT&CK技战术数据☆16Updated 4 years ago
- Oops, It's funny to detect a webshell. Temporarily not maintained☆18Updated 7 years ago
- ☆56Updated 4 years ago
- SDL China☆33Updated 6 years ago
- Python nbtstat + smb_version without third party packages☆30Updated 3 years ago
- webshell and nonwebshell samples,which can be used to train machine learning models to detect webshell☆43Updated 5 years ago
- a collection of webshell☆47Updated 6 years ago
- check_IP is to judge whether a IP is malicious based on open threat intelligence,基于开源威胁情报AlienVault, 排查IP地址及域名的恶意性☆52Updated 6 years ago
- ☆38Updated last year
- ☆38Updated 3 years ago
- 日常积累的安全工具与代码、脚本☆45Updated 3 months ago
- ☆21Updated 7 years ago
- ☆24Updated 5 years ago
- 基于inotify的Linux文件实时监控程序,同时调用河马扫描来检测文件☆22Updated 4 years ago
- ☆105Updated 7 years ago