#
snort
Here are 83 public repositories matching this topic...
psad: Intrusion Detection and Log Analysis with iptables
-
Updated
Nov 17, 2018 - Perl
idstools: Snort and Suricata Rule and Event Utilities in Python (Including a Rule Update Tool)
-
Updated
Jun 11, 2019 - Python
An UNOFFICIAL Git Repository of Snort Rules(IDS rules) Releases.
ids
intrusion-detection
ruleset
snort
abuse-detection
snort-rules
suricata-rules
ids-rules
snort-rule
-
Updated
Jul 5, 2020 - C
Snort IDS/IPS log analytics using the Elastic Stack.
-
Updated
May 19, 2020 - Shell
A website and framework for testing NIDS detection
-
Updated
May 22, 2020 - Shell
Development repository for the snort cookbook
-
Updated
Jun 29, 2020 - Ruby
Network Tools
pcap
docker-container
plug-ins
network-monitoring
mercury
network-analysis
tcpdump
network-security
snort
pcap-analyzer
p0f
network-tap
pmercury
libtrace
-
Updated
Jul 2, 2020 - C
Deploy pfelk with docker-compose
-
Updated
Jun 23, 2020 - Dockerfile
-
Updated
Feb 23, 2020 - Shell
aka GENESIDS: Reads and parses rules using a "snort like" syntax and generates and sends packets that trigger events in signature based IDS (Intrusion Detection Systems) using these rules
-
Updated
Nov 9, 2018 - C++
-
Updated
Dec 12, 2017 - R
IDS based on Machine Learning technical
-
Updated
Nov 12, 2018 - C++
Collection of Snort 2/3 rules.
-
Updated
Jun 22, 2018
Ansible playbook automation for pfelk
ansible
elasticsearch
ansible-playbook
elk
maxmind
dashboards
suricata
pfsense
snort
elk-stack
pfelk
-
Updated
Jun 6, 2020
A tool for simplifying network administration. Gets log messages from Snort IDS, processes them, classifies them as either THREAT / NOT_THREAT then creates a pop up window incase of a threat.
-
Updated
Jun 29, 2018 - Python
A default configuration to spin up Snort.
-
Updated
Jun 22, 2018
Kippo Honeypot and Snort IDS implemented on Raspberry Pi 3
-
Updated
Jul 20, 2017
This is an open source Snort rules repository
-
Updated
Jul 6, 2020
Parses Snort/Suricata rules to generate reports to understand the signature coverage on your sensor with a given ruleset. The goal is to assist the analyst with tuning their signatures for their specific environment.
-
Updated
Jun 8, 2018 - Python
Improve this page
Add a description, image, and links to the snort topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the snort topic, visit your repo's landing page and select "manage topics."
We're going to deprecate the distribution of this file in favor of people linking back to snort.org to provide up to date documentation for every rule and reduce bandwidth usage.