scirius
Rule management tool
A web-based interface for managing Suricata rulesets and threat hunting.
Scirius is a web application for Suricata ruleset management and threat hunting.
636 stars
56 watching
150 forks
Language: Python
last commit: 11 months ago
Linked from 1 awesome list
cybersecuritydetectionguiinterfacemanagementnetwork-intrusion-detectionnetwork-securitypythonsecuritysignaturessuricatasuricata-rulesthreat-huntinguser-interface
Related projects:
| Repository | Description | Stars |
|---|---|---|
| | A comprehensive guide to Suricata features and best practices for security analysts and threat hunters. | 53 |
| | Customizable dashboards and visualizations for security monitoring and analysis using Suricata IDPS and the ELK stack. | 33 |
| | Provides resources and tools for analyzing Suricata data | 29 |
| | Templates for Kibana 6 to visualize and analyze Suricata threat intelligence data | 24 |
| | An implementation of the Language Server Protocol for Suricata signatures, adding syntax check and auto-completion to editors. | 66 |
| | An integrated security monitoring platform using Suricata and Elasticsearch to analyze network traffic and alerts | 1,492 |
| | Provides Suricata IDS alert rules for detecting network anomalies | 154 |
| | A collection of rules and configuration files for Suricata, a network traffic analysis tool | 5 |
| | A Rust library to parse Suricata security rules and convert them into a higher-level data format | 9 |
| | Manages security incident responses and provides a knowledge base for cyber security teams | 245 |
| | A Python package for parsing and generating Snort/Suricata security rules | 29 |
| | Automates Suricata monitoring interface configuration and detection thread allocation based on real-time network interface status changes. | 11 |
| | Templates and dashboards for threat hunting with Suricata IDPS/NSM and the ELK 7 stack | 40 |
| | A repository for collecting and sharing SIEM rules in STIX format for automated translation to Sigma syntax | 90 |
| | A repository of high-quality Suricata IDS rules for detecting various malicious activities and behaviors. | 1,140 |