Collection of Suricata rule sets that I use modified to my environments.
-
Updated
Sep 13, 2020
Collection of Suricata rule sets that I use modified to my environments.
An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and videos, Technical guidelines and important resources about Threat Intelligence.
An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and videos, Technical guidelines and important resources about Threat Detection & Hunting.
Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.
Threat Response Serverless Relay Template
Threat Response Serverless Relay for SpyCloud Employee ATO Prevention
Threat Response Serverless Relay for Cyberprotect Threatscore
Threat Response Serverless Relay for Gigamon ThreatINSIGHT
Threat Response Serverless Relay for AlienVault OTX
Threat Response Serverless Relay for urlscan.io
Threat Response CTIM Bundle Builder
Threat Response Serverless Relay for Google Safe Browsing
Add a description, image, and links to the threat-response topic page so that developers can more easily learn about it.
To associate your repository with the threat-response topic, visit your repo's landing page and select "manage topics."