Scirius is a web application for Suricata ruleset management and threat hunting.
-
Updated
May 31, 2024 - Python
Scirius is a web application for Suricata ruleset management and threat hunting.
Signatures and IoCs from public Volexity blog posts.
Mapping NSM rules to MITRE ATT&CK
A website and framework for testing NIDS detection
BlackBerry Threat Research & Intelligence
S2AN - Mapper of Sigma/Suricata Rules/Signatures ➡️ MITRE ATT&CK Navigator
Configuring the Suricata IDS to detect DoS attacks by adding custom rule file.
Collection of Suricata rule sets that I use modified to my environments.
Pure python parser for Snort/Suricata rules.
Suricata rules for SCADA
OPNSense's Suricata IDS/IPS Detection Rules Against NMAP Scans
Golang Suricata/Snort rules parser and generator
Suricata config to apply IDPS mode on Ubuntu 18.04 LTS
Suricata rules that can detect a wide range of threats, including malware, exploits, and other malicious activity especially web application attacks
Snort and Suricata Rules
Kibana logging for simple_lamp server
This home-lab provides individuals with hands-on experience in setting up, configuring, and utilizing Suricata to enhance network security.
Bash script to download custom Suricata rulesets to an OPNsense device.
Add a description, image, and links to the suricata-rules topic page so that developers can more easily learn about it.
To associate your repository with the suricata-rules topic, visit your repo's landing page and select "manage topics."