Signatures and IoCs from public Volexity blog posts.
-
Updated
Feb 13, 2025 - Python
Signatures and IoCs from public Volexity blog posts.
Guidance for mitigating obsolete Transport Layer Security configurations. #nsacyber
A website and framework for testing NIDS detection
Collection of Suricata rule sets that I use modified to my environments.
Convert snort IPS signatures to FortiGate custom IPS signature syntax.
Collection of Snort 2/3 rules.
This is an open source Snort rules repository
Pure python parser for Snort/Suricata rules.
A compilation of snort rules for detecting malware traffic.
🐗 Tools to Work with 'Snort' Rules, Logs and Data
suricata-check is a command line utility to provide feedback on Suricata rules. The tool can detect various issues including those covering syntax validity, interpretability, rule specificity, rule coverage, and efficiency.
IDS Snort Alert Bot Telegram Using Shell Bash GNU/Linux
Golang Suricata/Snort rules parser and generator
Contains all snort configurations with 'drop' rules.
This work focuses on the detection of XSS attack using intrusion detection system. Here attack signature is utilized to detect XSS attack. To test the usefulness and effectiveness of proposed work a proof of concept prototype has been implemented using SNORT IDS. It is observed that proposed system correctly detected XSS attack.
IPv6 Segment Routing aware snort
SigZap is a Streamlit application designed to facilitate the search across multiple network signature sets at once.
This repository provides comprehensive guides, configurations, rules, and practical examples for Snort, the open-source intrusion detection system (IDS). Ideal for cybersecurity professionals and enthusiasts looking to enhance their network security skills.
Add a description, image, and links to the snort-rules topic page so that developers can more easily learn about it.
To associate your repository with the snort-rules topic, visit your repo's landing page and select "manage topics."