{"payload":{"pageCount":1,"repositories":[{"type":"Public","name":"suricata","owner":"OISF","isFork":false,"description":"Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine developed by the OISF and the Suricata community.","topicNames":["cybersecurity","suricata","ids","network-monitoring","threat-hunting","nsm","ips","intrusion-detection-system","network-monitor","intrusion-prevention-system"],"topicsNotShown":1,"primaryLanguage":{"name":"C","color":"#555555"},"pullRequestCount":80,"issueCount":0,"starsCount":4048,"forksCount":1366,"license":"GNU General Public License v2.0","participation":[20,104,27,23,32,40,23,19,20,18,31,12,30,32,24,8,5,6,9,21,12,37,18,15,10,8,13,14,29,25,54,29,18,21,11,34,23,18,7,23,27,41,24,31,12,22,14,31,20,5,27,11],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-04-26T13:49:38.746Z"}},{"type":"Public","name":"suricata-verify","owner":"OISF","isFork":false,"description":"Suricata Verification Tests - Testing Suricata Output","topicNames":[],"topicsNotShown":0,"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":45,"issueCount":0,"starsCount":94,"forksCount":85,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-04-26T10:54:53.822Z"}},{"type":"Public","name":"libhtp","owner":"OISF","isFork":false,"description":"LibHTP is a security-aware parser for the HTTP protocol and the related bits and pieces. ","topicNames":[],"topicsNotShown":0,"primaryLanguage":{"name":"C++","color":"#f34b7d"},"pullRequestCount":2,"issueCount":8,"starsCount":281,"forksCount":113,"license":"BSD 3-Clause \"New\" or \"Revised\" License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-04-23T21:16:04.428Z"}},{"type":"Public","name":"suricata-intel-index","owner":"OISF","isFork":false,"description":"Suricata rule and intel index","topicNames":["rules","security","intel","suricata","ids","signatures","nsm","ips"],"topicsNotShown":0,"primaryLanguage":null,"pullRequestCount":1,"issueCount":0,"starsCount":26,"forksCount":13,"license":null,"participation":[0,1,0,0,0,0,1,0,0,0,0,1,0,0,0,0,0,0,0,2,0,0,0,0,2,0,1,0,0,0,0,0,0,0,0,0,0,0,0,0,2,0,0,0,0,0,2,0,0,0,0,2],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-04-23T17:43:09.889Z"}},{"type":"Public","name":"suricata-update","owner":"OISF","isFork":false,"description":"The tool for updating your Suricata rules.","topicNames":["security","suricata","ids","network-monitoring","nsm","ips"],"topicsNotShown":0,"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":12,"issueCount":0,"starsCount":235,"forksCount":89,"license":"GNU General Public License v2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-04-18T19:22:02.367Z"}},{"type":"Public","name":"suricata-trafficid","owner":"OISF","isFork":false,"description":"Application and service identification rules for Suricata","topicNames":[],"topicsNotShown":0,"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":3,"issueCount":0,"starsCount":17,"forksCount":8,"license":"GNU General Public License v2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-11-07T13:31:04.808Z"}}],"repositoryCount":6,"userInfo":null,"searchable":true,"definitions":[],"typeFilters":[{"id":"all","text":"All"},{"id":"public","text":"Public"},{"id":"source","text":"Sources"},{"id":"fork","text":"Forks"},{"id":"archived","text":"Archived"},{"id":"mirror","text":"Mirrors"},{"id":"template","text":"Templates"}],"compactMode":false},"title":"Repositories"}