This home-lab provides individuals with hands-on experience in setting up, configuring, and utilizing Suricata to enhance network security.
-
Updated
Apr 10, 2024
This home-lab provides individuals with hands-on experience in setting up, configuring, and utilizing Suricata to enhance network security.
Bash script to download custom Suricata rulesets to an OPNsense device.
Ruleset based off Malicious Actors in my personal experience for use with Suricata specifically targeting OpnSense Installations.
Given a file containing a list of fully qualified DNS domains, quickburn generates IDS rules which detect those domains (and their subdomains) in DNS queries, the HTTP Host header, or TLS SNI (or all of the above!)
This small repository displays the documentation of Emerging Threats Open Rules Suricata 4
Scirius is a web application for Suricata ruleset management.
Demonstrating Intrusion Detection and Prevention capabilities through Suricata IDPS.
Technical resources and knowledge base for dtection.io
Snort and Suricata Rules
Kibana logging for simple_lamp server
Golang Suricata/Snort rules parser and generator
Suricata config to apply IDPS mode on Ubuntu 18.04 LTS
Suricata rules that can detect a wide range of threats, including malware, exploits, and other malicious activity especially web application attacks
OPNSense's Suricata IDS/IPS Detection Rules Against NMAP Scans
Suricata rules for SCADA
Pure python parser for Snort/Suricata rules.
Collection of Suricata rule sets that I use modified to my environments.
Configuring the Suricata IDS to detect DoS attacks by adding custom rule file.
S2AN - Mapper of Sigma/Suricata Rules/Signatures ➡️ MITRE ATT&CK Navigator
Add a description, image, and links to the suricata-rules topic page so that developers can more easily learn about it.
To associate your repository with the suricata-rules topic, visit your repo's landing page and select "manage topics."