xisafe / suricata-ruleLinks
suricata IDS的规则,测试在用的,部分自写的规则视情况放出。
☆18Updated 6 years ago
Alternatives and similar repositories for suricata-rule
Users that are interested in suricata-rule are comparing it to the libraries listed below
Sorting:
- 天御攻防实验室 - 威胁猎杀实战系列☆102Updated 6 years ago
- ThreatHound is a threat intelligence query tool use for detecting potentially malicious IP or domains. It combines the MISP open source t…☆40Updated 6 years ago
- 《横向移动攻击与检测技术》专栏文章☆17Updated 6 years ago
- Suricata安装部署&丢包优化&性能调优&规则调整&Pfring设置☆143Updated 6 years ago
- A simple web platform for WatchAD☆110Updated 2 years ago
- ☆57Updated 4 years ago
- Suricata rules for the new critical vulnerabilities☆84Updated 4 years ago
- A Solution For Cross-Platform Obfuscated Commands Detection presented on CIS2019 China. 动静态Bash/CMD/PowerShell命令混淆检测框架 - CIS 2019大会☆165Updated 6 years ago
- nmap service and application version detection (without nmap installation)☆116Updated 7 years ago
- ☆30Updated 2 years ago
- 恶意脚本检测分类工具☆40Updated 4 years ago
- ☆59Updated last year
- HIDS全称是Host-based Intrusion Detection System,即基于主机型入侵检测系统,HIDS运行依赖这样一个原理:一个成功的入侵者一般而言都会留下他们入侵的痕迹。本人更倾向于通过记录主机的重要信息变更来发现入侵者。 本项目由两部分组成:一部分…