Skip to content

Suricata rules that can detect a wide range of threats, including malware, exploits, and other malicious activity especially web application attacks

License

Notifications You must be signed in to change notification settings

daffainfo/suricata-rules

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

13 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Suricata Rules

This repository contains a large collection of rules for the Suricata intrusion detection system (IDS). Suricata is an open-source network IDS that can detect a wide range of threats, including malware, exploits, and other malicious activity. Our rules are designed to be highly effective at detecting web application attack especially detecting latest CVEs.

This repository is heavily influenced by nuclei-templates repository by ProjectDiscovery

Usage

main.py will merge all rules into one file

python3 main.py --path=/path/to/rules

Suricata Rules Statistics

Rules Count
linux-structures.rules 16
CNVD-2021.rules 10
CVE-2008.rules 9
CVE-2013.rules 8
sql-injection.rules 6
CNVD-2020.rules 5
miscellaneous.rules 4
CVE-2007.rules 4
CVE-2020.rules 4
CVE-2002.rules 4

To-Do

Contributors

You can contribute to this repository by adding new rules or you can update the existing rules

About

Suricata rules that can detect a wide range of threats, including malware, exploits, and other malicious activity especially web application attacks

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages