🐗 Tools to Work with 'Snort' Rules, Logs and Data
-
Updated
Dec 12, 2017 - R
🐗 Tools to Work with 'Snort' Rules, Logs and Data
IPv6 Segment Routing aware snort
Contains all snort configurations with 'drop' rules.
This work focuses on the detection of XSS attack using intrusion detection system. Here attack signature is utilized to detect XSS attack. To test the usefulness and effectiveness of proposed work a proof of concept prototype has been implemented using SNORT IDS. It is observed that proposed system correctly detected XSS attack.
Collection of Snort 2/3 rules.
Complemento e instalación de SNORT
Snort test rules for certain threats
Snorby Container
Collection of Suricata rule sets that I use modified to my environments.
Guidance for mitigating obsolete Transport Layer Security configurations. #nsacyber
A compilation of snort rules for detecting malware traffic.
Snort/Suricata rule syntax highlighting for GTK-based text editors (gedit)
Snort and Suricata Rules
Technical resources and knowledge base for dtection.io
IDS Snort Alert Bot Telegram Using Shell Bash GNU/Linux
This is an open source Snort rules repository
Given a file containing a list of fully qualified DNS domains, quickburn generates IDS rules which detect those domains (and their subdomains) in DNS queries, the HTTP Host header, or TLS SNI (or all of the above!)
Add a description, image, and links to the snort-rules topic page so that developers can more easily learn about it.
To associate your repository with the snort-rules topic, visit your repo's landing page and select "manage topics."