suricata-4-analysts
Suricata guide
A comprehensive guide to Suricata features and best practices for security analysts and threat hunters.
The Security Analyst’s Guide to Suricata
53 stars
8 watching
12 forks
Language: Python
last commit: 9 months ago
Linked from 1 awesome list
Related projects:
Repository | Description | Stars |
---|---|---|
| Provides resources and tools for analyzing Suricata data | 29 |
| Templates for Kibana 6 to visualize and analyze Suricata threat intelligence data | 24 |
| A web-based interface for managing Suricata rulesets and threat hunting. | 636 |
| Customizable dashboards and visualizations for security monitoring and analysis using Suricata IDPS and the ELK stack. | 33 |
| Customizable dashboards for Suricata IDPS and ELK stack | 43 |
| An implementation of the Language Server Protocol for Suricata signatures, adding syntax check and auto-completion to editors. | 66 |
| Templates and dashboards for threat hunting with Suricata IDPS/NSM and the ELK 7 stack | 40 |
| An integrated security monitoring platform using Suricata and Elasticsearch to analyze network traffic and alerts | 1,492 |
| A collection of Suricata data sets and sample analysis scripts | 31 |
| A tool designed to aid cybersecurity analysts in automating routine checks and enhancing their workflow | 1,364 |
| Develops and shares a large language model for network security applications, enabling the exploration of AI in cybersecurity. | 1,953 |
| Tool to generate Suricata rules from various input formats and configurations | 3 |
| A Rust library to parse Suricata security rules and convert them into a higher-level data format | 9 |
| A collection of guidelines and best practices for coding style and documentation in the Suricata project | 7 |
| A collection of rules and configuration files for Suricata, a network traffic analysis tool | 5 |