Here are
105 public repositories
matching this topic...
⭐ ⭐ Distributed tcpdump for cloud native environments ⭐ ⭐
Pulled Pork for Snort and Suricata rule management (from Google code)
psad: Intrusion Detection and Log Analysis with iptables
Updated
Nov 17, 2018
Perl
idstools: Snort and Suricata Rule and Event Utilities in Python (Including a Rule Update Tool)
Updated
Apr 25, 2022
Python
The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat hunting rules.
Updated
Apr 25, 2022
Python
Updated
Jun 23, 2021
Dockerfile
Programmatically create hunting rules for deserialization exploitation with multiple keywords, gadget chains, object types, encodings, and rule types
Updated
Mar 26, 2022
YARA
Snort IDS/IPS log analytics using the Elastic Stack.
Updated
Jul 28, 2021
Shell
A website and framework for testing NIDS detection
Updated
Aug 29, 2021
Shell
Detection in the form of Yara, Snort and ClamAV signatures.
Updated
Mar 11, 2022
YARA
Deploy pfelk with docker-compose
Updated
Mar 29, 2022
Dockerfile
IDS using a port mirror, Snort and an alert -> RESTCONF utility
Development repository for the snort cookbook
Updated
Feb 17, 2022
Ruby
aka GENESIDS: Reads and parses rules using a "snort like" syntax and generates and sends packets that trigger events in signature based IDS (Intrusion Detection Systems) using these rules
Ansible playbook automation for pfelk
Collection of Suricata rule sets that I use modified to my environments.
A website and framework for testing NIDS detection
Updated
Aug 29, 2021
Shell
This is an open source Snort rules repository
IDS based on Machine Learning technical
Updated
Feb 23, 2020
Shell
parses and generates Snort rules similar to PERL's Snort::Rule
Snort + Pulledpork + Websnort in Docker!
Updated
Nov 9, 2021
Dockerfile
A compilation of snort rules for detecting malware traffic.
🐗 Tools to Work with 'Snort' Rules, Logs and Data
Collection of Snort 2/3 rules.
Open Source Linux Frontend to the ClamAV Antivirus Engine
Home router IDS solution with a Raspberry Pi 3. Dynamically resolves device name, manufacturer, and alerts user of Snort analytics through email or text. Currently handles around 15,000 rules.
Updated
Apr 4, 2019
Shell
This project shows the creation of Snort-router as an Intrusion Detection and Prevention System
Improve this page
Add a description, image, and links to the
snort
topic page so that developers can more easily learn about it.
Curate this topic
Add this topic to your repo
To associate your repository with the
snort
topic, visit your repo's landing page and select "manage topics."
Learn more
You can’t perform that action at this time.
You signed in with another tab or window. Reload to refresh your session.
You signed out in another tab or window. Reload to refresh your session.