Found 26 repositories(showing 26)
OISF
The tool for updating your Suricata rules.
jasonish
idstools: Snort and Suricata Rule and Event Utilities in Python (Including a Rule Update Tool)
seanthegeek
Updates the Emerging Threats open ruleset for Suricata
pevma
Mass deploy and update Suricata IDPS using Ansible IT automation platform
This is a simple script for updating Emerging Threats rules files and restarting suricata on dd-wrt
miked235
Suricata Docker container with rules updater for Kubernetes deployments
simonbt
Rules updating script for Suricata IDS engine
nabiulla
A tool for updating Suricata rules and other inputs to the Suricata engine.
abolfazlbm
Simple offline rule updater Server for Suricata's Pfsense
nobuyuki-ito
No description available
perigee
Naive docker image to filter the suricata rules
MathewsCarioca
No description available
j0nny55555
Suricata update files focused on preventing FPs and other Noise
Fidelis-Machines
An implementation of suricat-update implemented in Rust.
jjung1
No description available
noodled
Suricata Rule Update Tool
OlenaGorodetska
For automation rules uptades
No description available
MozharAlhosni
A suricata-update Windows Port written using Rust
awiley-coyote
A way to automatically tune rules based on your network without needing a netwokr connection
ddebasys
Rules updating script for Suricata IDS engine
edsonencinas
This project extends the Splunk and Log Source Lab by deploying Suricata as a network-based Intrusion Detection System (IDS). It documents the installation, configuration, and validation of Suricata, including rule updates and attack simulation.
Pamidipallikiran
Suricata detects a threat → Wazuh collects and forwards the alert → TheHive receives and creates a case → Cortex analyzes and enriches the case → TheHive updates and automates the response.
hafsamehreen01-a11y
Simulated a Kaseya VSA–style supply-chain attack by emulating a compromised software update workflow. Built a controlled Flask-based update server and monitored malicious activity using Security Onion and Suricata, focusing on detection, alerting, and defensive analysis of endpoint threats.
Amara-lorritta
Hands-on security lab demonstrating how to mitigate malware threats using AWS Network Firewall. Includes creation of a stateful rule group with Suricata-based intrusion prevention rules, updating a firewall policy, and testing from an isolated EC2 test instance to confirm malicious sites are blocked.
Smurfs0nParade
Using Suricata with bash scripting to detect malicious IPs. The script update-mdl.sh downloads a list of IP addresses and a list of Malicious IPs. These lists are compared to one another and a rating is applied based on the number of occurances.
All 26 repositories loaded