scirius
Rule management tool
A web-based interface for managing Suricata rulesets and threat hunting.
Scirius is a web application for Suricata ruleset management and threat hunting.
636 stars
56 watching
150 forks
Language: Python
last commit: about 1 month ago
Linked from 1 awesome list
cybersecuritydetectionguiinterfacemanagementnetwork-intrusion-detectionnetwork-securitypythonsecuritysignaturessuricatasuricata-rulesthreat-huntinguser-interface
Related projects:
Repository | Description | Stars |
---|---|---|
stamusnetworks/suricata-4-analysts | A comprehensive guide to Suricata features and best practices for security analysts and threat hunters. | 53 |
stamusnetworks/kts | Customizable dashboards and visualizations for security monitoring and analysis using Suricata IDPS and the ELK stack. | 33 |
stamusnetworks/suricata-analytics | Provides resources and tools for analyzing Suricata data | 29 |
stamusnetworks/kts6 | Templates for Kibana 6 to visualize and analyze Suricata threat intelligence data | 24 |
stamusnetworks/suricata-language-server | An implementation of the Language Server Protocol for Suricata signatures, adding syntax check and auto-completion to editors. | 66 |
stamusnetworks/selks | An integrated security monitoring platform using Suricata and Elasticsearch to analyze network traffic and alerts | 1,492 |
travisbgreen/hunting-rules | Provides Suricata IDS alert rules for detecting network anomalies | 154 |
quadrantsec/suricata-rules | A collection of rules and configuration files for Suricata, a network traffic analysis tool | 5 |
jasonish/suricatax-rule-parser-rs | A Rust library to parse Suricata security rules and convert them into a higher-level data format | 9 |
sandialabs/scot | Manages security incident responses and provides a knowledge base for cyber security teams | 245 |
m-chrome/py-suricataparser | A Python package for parsing and generating Snort/Suricata security rules | 29 |
dcso/slinkwatch | Automates Suricata monitoring interface configuration and detection thread allocation based on real-time network interface status changes. | 11 |
stamusnetworks/kts7 | Templates and dashboards for threat hunting with Suricata IDPS/NSM and the ELK 7 stack | 40 |
securityriskadvisors/talr | A repository for collecting and sharing SIEM rules in STIX format for automated translation to Sigma syntax | 90 |
al0ne/suricata-rules | A repository of high-quality Suricata IDS rules for detecting various malicious activities and behaviors. | 1,140 |