192 results for “topic:snort”
:star: :star: Distributed tcpdump for cloud native environments :star: :star:
Pulled Pork for Snort and Suricata rule management (from Google code)
psad: Intrusion Detection and Log Analysis with iptables
Evasion by machine code de-optimization.
A website and framework for testing NIDS detection
idstools: Snort and Suricata Rule and Event Utilities in Python (Including a Rule Update Tool)
Detection in the form of Yara, Snort and ClamAV signatures.
The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat hunting rules.
Programmatically create hunting rules for deserialization exploitation with multiple keywords, gadget chains, object types, encodings, and rule types
Snort FAQ
Snort IDS/IPS log analytics using the Elastic Stack.
自己收藏的常用dockerfile
A website and framework for testing NIDS detection
Deploy pfelk with docker-compose
Collection of Snort 2/3 rules.
Collection of Suricata rule sets that I use modified to my environments.
IDS using a port mirror, Snort and an alert -> RESTCONF utility
Network Tools
This is an open source Snort rules repository
SNORT GUI: sniff sniffs the baddies and helps you setup SNORT ids in your network
Development repository for the snort cookbook
Pulled Pork for Snort3 rule management
Open Source Linux Frontend to the ClamAV Antivirus Engine
Ansible playbook automation for pfelk
aka GENESIDS: Reads and parses rules using a "snort like" syntax and generates and sends packets that trigger events in signature based IDS (Intrusion Detection Systems) using these rules
Snort + Pulledpork + Websnort in Docker!
IDS based on Machine Learning technical
suricata-check is a command line utility to provide feedback on Suricata rules. The tool can detect various issues including those covering syntax validity, interpretability, rule specificity, rule coverage, and efficiency.
The continuation of BASE (Basic Analysis and Security Engine), by @secureideas, et al. A web app to query and analyze alerts coming from a SNORT IDS.
VEDAS-Driven Autonomous Generation of Suricata Rules for CVEs