Signatures and IoCs from public Volexity blog posts.
-
Updated
Nov 22, 2024 - Python
Signatures and IoCs from public Volexity blog posts.
Guidance for mitigating obsolete Transport Layer Security configurations. #nsacyber
A website and framework for testing NIDS detection
Collection of Suricata rule sets that I use modified to my environments.
Convert snort IPS signatures to FortiGate custom IPS signature syntax.
Collection of Snort 2/3 rules.
This is an open source Snort rules repository
Pure python parser for Snort/Suricata rules.
A compilation of snort rules for detecting malware traffic.
🐗 Tools to Work with 'Snort' Rules, Logs and Data
Golang Suricata/Snort rules parser and generator
IDS Snort Alert Bot Telegram Using Shell Bash GNU/Linux
Contains all snort configurations with 'drop' rules.
This work focuses on the detection of XSS attack using intrusion detection system. Here attack signature is utilized to detect XSS attack. To test the usefulness and effectiveness of proposed work a proof of concept prototype has been implemented using SNORT IDS. It is observed that proposed system correctly detected XSS attack.
SigZap is a Streamlit application designed to facilitate the search across multiple network signature sets at once.
IPv6 Segment Routing aware snort
Technical resources and knowledge base for dtection.io
Add a description, image, and links to the snort-rules topic page so that developers can more easily learn about it.
To associate your repository with the snort-rules topic, visit your repo's landing page and select "manage topics."