suricata-rules
IDS rule set
A repository of high-quality Suricata IDS rules for detecting various malicious activities and behaviors.
Suricata IDS rules 用来检测红队渗透/恶意行为等,支持检测CobaltStrike/MSF/Empire/DNS隧道/Weevely/菜刀/冰蝎/挖矿/反弹shell/ICMP隧道等
1k stars
41 watching
292 forks
last commit: over 1 year ago idssecuritysignaturessuricatasuricata-rule
Related projects:
Repository | Description | Stars |
---|---|---|
| Provides Suricata IDS alert rules for detecting network anomalies | 154 |
| A collection of rules and configuration files for Suricata, a network traffic analysis tool | 5 |
| Customized Suricata detection rules to identify NMAP scan types | 59 |
| A Rust library to parse Suricata security rules and convert them into a higher-level data format | 9 |
| A Python package for parsing and generating Snort/Suricata security rules | 29 |
| A collection of various rulesets for network intrusion detection systems | 22 |
| Tool to generate Suricata rules from various input formats and configurations | 3 |
| A tool to generate Suricata rules based on indicators from the OTX API | 107 |
| A library for parsing and optimizing IDS rules | 180 |
| A collection of Python libraries for working with intrusion detection systems. | 279 |
| A centralized repository of Yara rules for detecting malware and other malicious activities. | 10 |
| A web-based interface for managing Suricata rulesets and threat hunting. | 636 |
| A collection of guidelines and best practices for coding style and documentation in the Suricata project | 7 |
| A collection of optimized hashcat rules generated from real-world password compromise data. | 391 |
| A language colorizer extension for Visual Studio Code that highlights Suricata rules syntax | 12 |