Scirius is a web application for Suricata ruleset management and threat hunting.
-
Updated
May 31, 2024 - Python
Scirius is a web application for Suricata ruleset management and threat hunting.
Signatures and IoCs from public Volexity blog posts.
Configuring the Suricata IDS to detect DoS attacks by adding custom rule file.
Suricata rules that can detect a wide range of threats, including malware, exploits, and other malicious activity especially web application attacks
Pure python parser for Snort/Suricata rules.
Scirius is a web application for Suricata ruleset management.
Given a file containing a list of fully qualified DNS domains, quickburn generates IDS rules which detect those domains (and their subdomains) in DNS queries, the HTTP Host header, or TLS SNI (or all of the above!)
Add a description, image, and links to the suricata-rules topic page so that developers can more easily learn about it.
To associate your repository with the suricata-rules topic, visit your repo's landing page and select "manage topics."