This small repository displays the documentation of Emerging Threats Open Rules Suricata 4
-
Updated
Apr 26, 2020 - HTML
This small repository displays the documentation of Emerging Threats Open Rules Suricata 4
Configuring the Suricata IDS to detect DoS attacks by adding custom rule file.
Mapping NSM rules to MITRE ATT&CK
Collection of Suricata rule sets that I use modified to my environments.
Kibana logging for simple_lamp server
Snort and Suricata Rules
Technical resources and knowledge base for dtection.io
Demonstrating Intrusion Detection and Prevention capabilities through Suricata IDPS.
Ruleset based off Malicious Actors in my personal experience for use with Suricata specifically targeting OpnSense Installations.
Suricata config to apply IDPS mode on Ubuntu 18.04 LTS
Suricata rules for SCADA
Scirius is a web application for Suricata ruleset management.
S2AN - Mapper of Sigma/Suricata Rules/Signatures ➡️ MITRE ATT&CK Navigator
Given a file containing a list of fully qualified DNS domains, quickburn generates IDS rules which detect those domains (and their subdomains) in DNS queries, the HTTP Host header, or TLS SNI (or all of the above!)
BlackBerry Threat Research & Intelligence
Pure python parser for Snort/Suricata rules.
Bash script to download custom Suricata rulesets to an OPNsense device.
Suricata rules that can detect a wide range of threats, including malware, exploits, and other malicious activity especially web application attacks
Add a description, image, and links to the suricata-rules topic page so that developers can more easily learn about it.
To associate your repository with the suricata-rules topic, visit your repo's landing page and select "manage topics."