suricata
Here are 162 public repositories matching this topic...
Ruleset based off Malicious Actors in my personal experience for use with Suricata specifically targeting OpnSense Installations.
-
Updated
Nov 15, 2021
Given a file containing a list of fully qualified DNS domains, quickburn generates IDS rules which detect those domains (and their subdomains) in DNS queries, the HTTP Host header, or TLS SNI (or all of the above!)
-
Updated
Jan 16, 2023 - Python
Log dari implementasi IDS Suricata 6.0.12 di Ubuntu 22.04 untuk mendeteksi intrusi
-
Updated
Jun 15, 2023
This is a simple script for updating Emerging Threats rules files and restarting suricata on dd-wrt
-
Updated
Mar 11, 2021 - Shell
Snort/Suricata rule syntax highlighting for GTK-based text editors (gedit)
-
Updated
Mar 23, 2021
Provides a cheatsheet and some scripts for Suricata to automatize installation, management, configuration and an util to help with the rules' creation.
-
Updated
Apr 12, 2021 - Python
Suricata/Snort extension for VS Code
-
Updated
May 2, 2024 - Rust
Syntax highlighting for suricata rules
-
Updated
May 28, 2019
An telegram bot that monitors suricata logs and sends alerts based on attack id's
-
Updated
May 15, 2024 - Python
www.spencerwalden.net. Spencer Walden's Infosec blog
-
Updated
Dec 18, 2022 - Shell
Improve this page
Add a description, image, and links to the suricata topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the suricata topic, visit your repo's landing page and select "manage topics."