scirius
Suricata rule manager
A web application for managing Suricata rulesets and threat hunting
Scirius is a web application for Suricata ruleset management and threat hunting.
635 stars
56 watching
150 forks
Language: Python
last commit: 11 days ago
Linked from 1 awesome list
cybersecuritydetectionguiinterfacemanagementnetwork-intrusion-detectionnetwork-securitypythonsecuritysignaturessuricatasuricata-rulesthreat-huntinguser-interface
Related projects:
Repository | Description | Stars |
---|---|---|
stamusnetworks/suricata-4-analysts | A comprehensive guide to Suricata features and best practices for security analysts and threat hunters. | 52 |
stamusnetworks/kts | Customizable dashboards and visualizations for security monitoring and analysis using Suricata IDPS and the ELK stack. | 33 |
stamusnetworks/suricata-analytics | Provides resources and tools for analyzing Suricata data | 27 |
stamusnetworks/kts6 | Templates for Kibana 6 to visualize and analyze Suricata threat intelligence data | 25 |
stamusnetworks/suricata-language-server | An implementation of the Language Server Protocol for Suricata signatures, adding syntax check and auto-completion to editors. | 64 |
stamusnetworks/selks | An integrated security monitoring platform using Suricata and Elasticsearch to analyze network traffic and alerts | 1,479 |
travisbgreen/hunting-rules | Provides Suricata IDS alert rules for detecting network anomalies | 153 |
quadrantsec/suricata-rules | A collection of rules and configuration files for Suricata, a network traffic analysis tool | 5 |
jasonish/suricatax-rule-parser-rs | A Rust library to parse Suricata security rules and convert them into a higher-level data format | 9 |
sandialabs/scot | An incident response management system and knowledge base designed to analyze data and coordinate team efforts in cyber security. | 245 |
m-chrome/py-suricataparser | A Python package for parsing and generating Snort/Suricata security rules | 27 |
dcso/slinkwatch | Automates Suricata monitoring interface configuration and detection thread allocation based on real-time network interface status changes. | 11 |
stamusnetworks/kts7 | Templates and dashboards for threat hunting with Suricata IDPS/NSM and the ELK 7 stack | 39 |
securityriskadvisors/talr | A repository for collecting and sharing SIEM rules in STIX format for automated translation to Sigma syntax | 89 |
al0ne/suricata-rules | A repository of high-quality Suricata IDS rules for detecting various malicious activities and behaviors. | 1,133 |