xisafe / suricata-rule
suricata IDS的规则,测试在用的,部分自写的规则视情况放出。
☆18Updated 6 years ago
Alternatives and similar repositories for suricata-rule:
Users that are interested in suricata-rule are comparing it to the libraries listed below
- 《横向移动攻击与检测技术》专栏文章☆17Updated 5 years ago
- 天御攻防实验室 - 威胁猎杀实战系列☆102Updated 5 years ago
- ThreatHound is a threat intelligence query tool use for detecting potentially malicious IP or domains. It combines the MISP open source t…☆39Updated 5 years ago
- nmap service and application version detection (without nmap installation)☆113Updated 7 years ago
- tcppc: A simple honeypot to capture TCP/TLS/UDP payloads on ALL ports.☆35Updated 4 years ago
- ☆9Updated 8 years ago
- ☆105Updated 7 years ago
- ☆30Updated 2 years ago
- Automatic reversed shell detecting and defensing☆51Updated 6 years ago
- Sep0lkit's Blog☆15Updated 5 years ago
- Audit your acl of network device☆34Updated 4 years ago
- Code snippet accompanying blog post☆30Updated 9 years ago
- ☆37Updated last year
- A golang client of our webshell scanner API☆28Updated 7 years ago
- Att&ck Cloud相关☆21Updated 4 years ago
- 恶意脚本检测分类工具☆40Updated 4 years ago
- ☆21Updated 7 years ago
- webshell and nonwebshell samples,which can be used to train machine learning models to detect webshell☆43Updated 6 years ago
- Shell say no to NIDS☆71Updated 5 years ago
- 威胁检测规则集☆15Updated 5 years ago
- 奇安信报开源软件漏洞cve所用目录。每个人报漏洞请建立自己的目录。☆45Updated 5 years ago
- The python client of passivedns.cn☆98Updated 6 years ago
- Python nbtstat + smb_version without third party packages☆30Updated 3 years ago
- ☆56Updated 4 years ago
- IDS Bypass tricks☆122Updated 6 years ago
- Suricata安装部署&丢包优化&性能调优&规则调整&Pfring设置☆141Updated 5 years ago
- ☆64Updated 7 years ago
- 对开源蜜罐的学习研究与理解☆56Updated 4 years ago
- Struts2 S2-045(CVE-2017-5638)Vulnerability environment - http://www.mottoin.com/97954.html☆24Updated 8 years ago
- Phantom eye——A passive business logic vulnerability auditing tool☆55Updated 6 years ago