scirius

Rule management tool

A web-based interface for managing Suricata rulesets and threat hunting.

Scirius is a web application for Suricata ruleset management and threat hunting.

GitHub

636 stars
56 watching
150 forks
Language: Python
last commit: about 1 month ago
Linked from 1 awesome list

cybersecuritydetectionguiinterfacemanagementnetwork-intrusion-detectionnetwork-securitypythonsecuritysignaturessuricatasuricata-rulesthreat-huntinguser-interface

Backlinks from these awesome lists:

Related projects:

Repository Description Stars
stamusnetworks/suricata-4-analysts A comprehensive guide to Suricata features and best practices for security analysts and threat hunters. 53
stamusnetworks/kts Customizable dashboards and visualizations for security monitoring and analysis using Suricata IDPS and the ELK stack. 33
stamusnetworks/suricata-analytics Provides resources and tools for analyzing Suricata data 29
stamusnetworks/kts6 Templates for Kibana 6 to visualize and analyze Suricata threat intelligence data 24
stamusnetworks/suricata-language-server An implementation of the Language Server Protocol for Suricata signatures, adding syntax check and auto-completion to editors. 66
stamusnetworks/selks An integrated security monitoring platform using Suricata and Elasticsearch to analyze network traffic and alerts 1,492
travisbgreen/hunting-rules Provides Suricata IDS alert rules for detecting network anomalies 154
quadrantsec/suricata-rules A collection of rules and configuration files for Suricata, a network traffic analysis tool 5
jasonish/suricatax-rule-parser-rs A Rust library to parse Suricata security rules and convert them into a higher-level data format 9
sandialabs/scot Manages security incident responses and provides a knowledge base for cyber security teams 245
m-chrome/py-suricataparser A Python package for parsing and generating Snort/Suricata security rules 29
dcso/slinkwatch Automates Suricata monitoring interface configuration and detection thread allocation based on real-time network interface status changes. 11
stamusnetworks/kts7 Templates and dashboards for threat hunting with Suricata IDPS/NSM and the ELK 7 stack 40
securityriskadvisors/talr A repository for collecting and sharing SIEM rules in STIX format for automated translation to Sigma syntax 90
al0ne/suricata-rules A repository of high-quality Suricata IDS rules for detecting various malicious activities and behaviors. 1,140