Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for suricata
suricata
x
162 search results found
Suricata
⭐
3,738
Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine developed by the OISF and the Suricata community.
Packetstreamer
⭐
1,851
⭐ ⭐ Distributed tcpdump for cloud native environments ⭐ ⭐
Malcolm
⭐
1,619
Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs and Suricata alerts.
Selks
⭐
1,120
A Suricata based IDS/IPS/NSM distro
Suricata Rules
⭐
991
Suricata IDS rules 用来检测红队渗透/恶意行为等,支持检测CobaltStrike/MSF/Empire/DNS隧道/W
Laikaboss
⭐
660
Laika BOSS: Object Scanning System
Blueteam_homelabs
⭐
654
Great List of Resources to Build an Enterprise Grade Home Lab
Tenzir
⭐
612
Open source security data pipelines.
Scirius
⭐
552
Scirius is a web application for Suricata ruleset management and threat hunting.
Rock
⭐
437
Automated deployment scripts for the RockNSM network hunting distribution.
Flare
⭐
394
An analytical framework for network traffic and behavioral analytics
Evebox
⭐
391
Web Based Event Viewer (GUI) for Suricata EVE Events in Elastic Search
Dalton
⭐
376
Suricata and Snort IDS rule and pcap testing system
S1em
⭐
373
This project is a SIEM with SIRP and Threat Intel, all in one.
Pulledpork
⭐
351
Pulled Pork for Snort and Suricata rule management (from Google code)
Qnsm
⭐
329
QNSM is network security monitoring framework based on DPDK.
Malcolm
⭐
305
Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs and Suricata alerts.
Py Idstools
⭐
261
idstools: Snort and Suricata Rule and Event Utilities in Python (Including a Rule Update Tool)
Briarids
⭐
206
An All-In-One home intrusion detection system (IDS) solution for the Raspberry PI.
Botsv1
⭐
206
Suricata Update
⭐
204
The tool for updating your Suricata rules.
Cve 2020 16898
⭐
197
CVE-2020-16898 (Bad Neighbor) Microsoft Windows TCP/IP Vulnerability Detection Logic and Rule
Docker Suricata
⭐
196
A Suricata Docker image.
Kibana Dashboards
⭐
188
A collection of Kibana 3.X dashboards from the community
Synesis_lite_suricata
⭐
184
Suricata IDS/IPS log analytics using the Elastic Stack.
Amsterdam
⭐
179
Docker based Suricata, Elasticsearch, Logstash, Kibana, Scirius aka SELKS
Quantuminsert
⭐
175
Quantum Insert
Gonids
⭐
151
gonids is a library to parse IDS rules, with a focus primarily on Suricata rule compatibility. There is a discussion forum available that you can join on Google Groups: https://groups.google.com/forum/#!topic/gonids/
Sweetie Data
⭐
139
This repo contains logstash of various honeypots
Sagan
⭐
132
Sagan is a multi-threads, high performance log analysis engine. At it's core, Sagan similar to Suricata/Snort but with logs rather than network packets.
Pcapmonkey
⭐
130
PcapMonkey will provide an easy way to analyze pcap using the latest version of Suricata and Zeek.
Dynamite Nsm
⭐
128
DynamiteNSM is a free Network Security Monitor developed by Dynamite Analytics to enable network visibility and advanced cyber threat detection
Nfr
⭐
120
A lightweight tool to score network traffic and flag anomalies
Ids_bypass
⭐
101
IDS Bypass tricks
Testmynids.org
⭐
100
A website and framework for testing NIDS detection
Suricata Verify
⭐
88
Suricata Verification Tests - Testing Suricata Output
Tylium
⭐
87
Primary data pipelines for intrusion detection, security analytics and threat hunting
Cdmcs
⭐
86
Cyber Defence Monitoring Course Suite :: Suricata, Moloch and others
Awesome Suricata
⭐
86
A curated list of awesome things related to Suricata
Rusticata
⭐
81
Rusticata: Rust parsers for Suricata (test code)
Securityonion Docs
⭐
77
Suricata Logstash Templates
⭐
74
Templates for Kibana/Logstash to use with Suricata IDPS
Nmap_bypass_ids
⭐
72
bypass IDS
Probemanager
⭐
65
Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...
Suriwire
⭐
64
Wireshark plugin to display Suricata analysis info
Altprobe
⭐
64
collector/runner
Cdmcs
⭐
62
Cyber Defence Monitoring Course Suite :: Suricata, Bro, Moloch
Brimcap
⭐
62
Convert pcap files into richly-typed ZNG summary logs (Zeek, Suricata, and more)
Docker
⭐
56
Deploy pfelk with docker-compose
Rule2alert
⭐
53
Improvements of/over the original rule2alert
S2an
⭐
51
S2AN - Mapper of Sigma Rules ➡️ MITRE ATT&CK
Gophercap
⭐
48
Accurate, modular, scalable PCAP manipulation tool written in Go.
Fever
⭐
48
fast, extensible, versatile event router for Suricata's EVE-JSON format
Dpdk_suricata 4_1_1
⭐
46
dpdk infrastructure for software acceleration. Currently working on RX and ACL pre-filter
How To Setup A Honeypot
⭐
45
How to setup a honeypot with an IDS, ELK and TLS traffic inspection
Royal_apt
⭐
45
Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research
Dpdk Suricata_3.0
⭐
45
add dpdk interface and packet processing to suricata in worker mode
Rdppot
⭐
44
RDP honeypot
Otx Suricata
⭐
44
The OTX Suricata Rule Generator can be used to create the rules and configuration for Suricata to alert on indicators from your OTX account.
Firewall Controller
⭐
44
A kubernetes controller running on bare-metal firewalls, creating nftables rules, configures suricata, collects network metrics
Balboa
⭐
43
server for indexing and querying passive DNS observations
Pcapdj
⭐
43
pcapdj - dispatch pcap files
Rules
⭐
42
OPNsense IDS/IPS rules
Vagrant_moloch_bro_suricata
⭐
38
vagrant multi-machine: Moloch, Bro,Suricata,ElasticSearch,Kibana
Kts5
⭐
38
Kibana 5 Templates for Suricata IDPS
Cisco Ios Xe Implant Detection
⭐
37
Cisco IOS XE implant scanning & detection (CVE-2023-20198, CVE-2023-20273)
Suricata_optimize
⭐
37
Suricata安装部署&丢包优化&性能调优&规则调整&Pfring设置
Dfir
⭐
35
Incident response teams usually working on the offline data, collecting the evidence, then analyze the data
Redonion
⭐
33
**BETA** A simple buildscript for network security monitoring on RHEL/CentOS
Kts
⭐
32
Kibana 4 Templates for Suricata IDPS
Idsdeathblossom
⭐
30
IDS Utility Belt For Automating/Testing Various Things
Dredd
⭐
29
Automated detection rule analysis utility
Detections
⭐
29
Threat intelligence and threat detection indicators (IOC, IOA)
Operation Wocao
⭐
28
Operation Wocao - Indicators of Compromise
Suricata2mikrotik
⭐
28
IPS Suricata2MikroTik -CE- is a module for Suricata to read eve.json file and search specifics alert to block the source. This connect to MikroTik via API to add the IP to block.
Kts7
⭐
28
Kibana 7 Templates for Suricata IDPS Threat Hunting
Ips Mikrotik Suricata
⭐
27
Module to connect Suricata / Barnyard2 to MikroTik for IPS on an eventual alert.
Unifiedbeat
⭐
26
Unifiedbeat reads records from Unified2 binary files generated by network intrusion detection software and indexes the records in Elasticsearch.
S4a
⭐
24
S4A main repository. SaltStack states, install script and build scripts
Ansible
⭐
24
Ansible playbook automation for pfelk
Thebriarpatch
⭐
22
An extremely crude, lightweight Web Frontend for Suricata/Bro to be used with BriarIDS
Sagan Rules
⭐
22
Docker Suricata Elk
⭐
21
[ABANDONED] A Docker container running Suricata and the ELK stack.
Nsm Attack
⭐
21
Mapping NSM rules to MITRE ATT&CK
Kts6
⭐
19
Kibana 6 Templates for Suricata IDPS Threat Hunting
Suricata Rpms
⭐
18
Suricata RPMs for CentOS/RHEL and Fedora
Gommunityid
⭐
17
Go implementation of the Community ID flow hashing standard
Fjospidie
⭐
17
FjoSpidie Honey Client
Suricata Graylog
⭐
17
Shrike
⭐
17
Resolve URL or refering site based on alert or http log match in eve log output from suricata submit to Cuckoo as url task
Suri Stats
⭐
17
A tools to work on suricata stats.log file.
Vagrant Ids
⭐
16
An Ubuntu 16.04 build containing Suricata, PulledPork, Bro, and Splunk
Pcapoptikon
⭐
16
Cve 2020 16899
⭐
15
CVE-2020-16899 - Microsoft Windows TCP/IP Vulnerability Detection Logic and Rule
Suricata Rules
⭐
15
Suricata rules that can detect a wide range of threats, including malware, exploits, and other malicious activity especially web application attacks
Toolbox
⭐
14
random crap and small/unfinished admin scripts
Utilities
⭐
14
This repository contains tools used by 401trg.
Suricata Rules
⭐
14
Suricata rules for the new critical vulnerabilities
Swaravm
⭐
14
SwaraVM is a mobile security virtual machine that aggregates tools and resources that are commonly used for network traffic analysis, malware analysis, digital forensics, vulnerability research and exploitation, reverse engineering, mobile and web application assessment, alongside a variety of mobile application practice labs.
Suricata
⭐
14
OpenWRT Suricata package
1-100 of 162 search results
Next >
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.