Signatures and IoCs from public Volexity blog posts.
-
Updated
Dec 2, 2024 - Python
Signatures and IoCs from public Volexity blog posts.
Guidance for mitigating obsolete Transport Layer Security configurations. #nsacyber
A website and framework for testing NIDS detection
Collection of Suricata rule sets that I use modified to my environments.
Convert snort IPS signatures to FortiGate custom IPS signature syntax.
Collection of Snort 2/3 rules.
This is an open source Snort rules repository
Pure python parser for Snort/Suricata rules.
A compilation of snort rules for detecting malware traffic.
🐗 Tools to Work with 'Snort' Rules, Logs and Data
Golang Suricata/Snort rules parser and generator
IDS Snort Alert Bot Telegram Using Shell Bash GNU/Linux
Contains all snort configurations with 'drop' rules.
This work focuses on the detection of XSS attack using intrusion detection system. Here attack signature is utilized to detect XSS attack. To test the usefulness and effectiveness of proposed work a proof of concept prototype has been implemented using SNORT IDS. It is observed that proposed system correctly detected XSS attack.
SigZap is a Streamlit application designed to facilitate the search across multiple network signature sets at once.
Technical resources and knowledge base for dtection.io
IPv6 Segment Routing aware snort
This repository offers a Dockerized deployment of Snort3 a robust network intrusion prevention system, facilitating the utilization of Snort3 for Network Functions Virtualization (NFV)
Add a description, image, and links to the snort-rules topic page so that developers can more easily learn about it.
To associate your repository with the snort-rules topic, visit your repo's landing page and select "manage topics."