hunting-rules
Network anomaly detector
Provides Suricata IDS alert rules for detecting network anomalies
Suricata rules for network anomaly detection
153 stars
16 watching
41 forks
last commit: 3 months ago
Linked from 1 awesome list
anomaly-detectioncyber-threat-intelligencecybersecurityidslateral-movementnetwork-monitoringnetwork-securitynsmsuricatasuricata-rulethreat-huntingthreat-intelligence
Related projects:
Repository | Description | Stars |
---|---|---|
aleksibovellan/opnsense-suricata-nmaps | Customized Suricata detection rules to identify NMAP scan types | 52 |
al0ne/suricata-rules | A repository of high-quality Suricata IDS rules for detecting various malicious activities and behaviors. | 1,133 |
quadrantsec/suricata-rules | A collection of rules and configuration files for Suricata, a network traffic analysis tool | 5 |
stamusnetworks/scirius | A web application for managing Suricata rulesets and threat hunting | 635 |
stamusnetworks/kts7 | Templates and dashboards for threat hunting with Suricata IDPS/NSM and the ELK 7 stack | 39 |
business-science/anomalize | A package providing functions to decompose and detect anomalies in time series data | 339 |
stamusnetworks/selks | An integrated security monitoring platform using Suricata and Elasticsearch to analyze network traffic and alerts | 1,479 |
nathanielc/morgoth | An anomaly detection framework for flexible and efficient metric analysis | 280 |
sbousseaden/slides | Collection of resources and concepts for threat hunting and detection engineering. | 372 |
sebdraven/iocmite | Automates importing threat intelligence data into Suricata's surveillance system | 37 |
sbasu7241/aws-threat-simulation-and-detection | This repository documents the simulation and detection of various AWS attack scenarios using Stratus Red Team and SumoLogic for logging and analysis. | 282 |
johnnyxmas/scancannon | Automated network vulnerability scanning and reconnaissance tool | 432 |
orobix/visual-feature-attribution-using-wasserstein-gans-pytorch | A PyTorch implementation of a feature attribution technique using Wasserstein Generative Adversarial Networks for anomaly detection in medical images. | 93 |
neo23x0/rules | A centralized repository of Yara rules for detecting malware and other malicious activities. | 10 |
klingerko/nids-rule-library | A collection of various rulesets for network intrusion detection systems | 20 |