-
Updated
Mar 6, 2023 - Go
snort
Here are 114 public repositories matching this topic...
psad: Intrusion Detection and Log Analysis with iptables
-
Updated
Nov 17, 2018 - Perl
idstools: Snort and Suricata Rule and Event Utilities in Python (Including a Rule Update Tool)
-
Updated
Sep 8, 2022 - Python
The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat hunting rules.
-
Updated
Apr 25, 2022 - Python
Programmatically create hunting rules for deserialization exploitation with multiple keywords, gadget chains, object types, encodings, and rule types
-
Updated
Mar 26, 2022 - YARA
Snort IDS/IPS log analytics using the Elastic Stack.
-
Updated
Jul 28, 2021 - Shell
A website and framework for testing NIDS detection
-
Updated
Jan 10, 2023 - Shell
A website and framework for testing NIDS detection
-
Updated
Aug 29, 2021 - Shell
Deploy pfelk with docker-compose
-
Updated
Mar 25, 2023 - Shell
Network Tools
-
Updated
Mar 25, 2023 - C
Collection of Suricata rule sets that I use modified to my environments.
-
Updated
Sep 13, 2020
Development repository for the snort cookbook
-
Updated
Mar 8, 2023 - Ruby
Ansible playbook automation for pfelk
-
Updated
Jan 11, 2022
This is an open source Snort rules repository
-
Updated
May 31, 2022
aka GENESIDS: Reads and parses rules using a "snort like" syntax and generates and sends packets that trigger events in signature based IDS (Intrusion Detection Systems) using these rules
-
Updated
Nov 9, 2018 - C++
Improve this page
Add a description, image, and links to the snort topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the snort topic, visit your repo's landing page and select "manage topics."