scirius

Suricata rule manager

A web application for managing Suricata rulesets and threat hunting

Scirius is a web application for Suricata ruleset management and threat hunting.

GitHub

635 stars
56 watching
150 forks
Language: Python
last commit: 11 days ago
Linked from 1 awesome list

cybersecuritydetectionguiinterfacemanagementnetwork-intrusion-detectionnetwork-securitypythonsecuritysignaturessuricatasuricata-rulesthreat-huntinguser-interface

Backlinks from these awesome lists:

Related projects:

Repository Description Stars
stamusnetworks/suricata-4-analysts A comprehensive guide to Suricata features and best practices for security analysts and threat hunters. 52
stamusnetworks/kts Customizable dashboards and visualizations for security monitoring and analysis using Suricata IDPS and the ELK stack. 33
stamusnetworks/suricata-analytics Provides resources and tools for analyzing Suricata data 27
stamusnetworks/kts6 Templates for Kibana 6 to visualize and analyze Suricata threat intelligence data 25
stamusnetworks/suricata-language-server An implementation of the Language Server Protocol for Suricata signatures, adding syntax check and auto-completion to editors. 64
stamusnetworks/selks An integrated security monitoring platform using Suricata and Elasticsearch to analyze network traffic and alerts 1,479
travisbgreen/hunting-rules Provides Suricata IDS alert rules for detecting network anomalies 153
quadrantsec/suricata-rules A collection of rules and configuration files for Suricata, a network traffic analysis tool 5
jasonish/suricatax-rule-parser-rs A Rust library to parse Suricata security rules and convert them into a higher-level data format 9
sandialabs/scot An incident response management system and knowledge base designed to analyze data and coordinate team efforts in cyber security. 245
m-chrome/py-suricataparser A Python package for parsing and generating Snort/Suricata security rules 27
dcso/slinkwatch Automates Suricata monitoring interface configuration and detection thread allocation based on real-time network interface status changes. 11
stamusnetworks/kts7 Templates and dashboards for threat hunting with Suricata IDPS/NSM and the ELK 7 stack 39
securityriskadvisors/talr A repository for collecting and sharing SIEM rules in STIX format for automated translation to Sigma syntax 89
al0ne/suricata-rules A repository of high-quality Suricata IDS rules for detecting various malicious activities and behaviors. 1,133