Loading...
Browse 12 security rules tools
Snort-compatible IDS/IPS rules, PCAPs & exploit library for security testing.
Snort-compatible IDS/IPS rules, PCAPs & exploit library for security testing.
Suite of network security tools for rule mgmt, PCAPs, and traffic analysis.
Suite of network security tools for rule mgmt, PCAPs, and traffic analysis.
Centralized IDS/IPS rule management platform for distributed networks.
Centralized IDS/IPS rule management platform for distributed networks.
Windows GUI tool for centralized Snort IDS/IPS rule mgmt across multiple sensors.
Windows GUI tool for centralized Snort IDS/IPS rule mgmt across multiple sensors.
Snort-compatible IDS/IPS rules & PCAP library covering 21,000+ proven exploits.
Snort-compatible IDS/IPS rules & PCAP library covering 21,000+ proven exploits.
GUI tool for creating, editing & validating Snort IDS/IPS rules.
GUI tool for creating, editing & validating Snort IDS/IPS rules.
WAF and ModSecurity ruleset for web app attack detection and blocking.
WAF and ModSecurity ruleset for web app attack detection and blocking.
ModSecurity-based WAF ruleset for detecting and blocking web app attacks.
ModSecurity-based WAF ruleset for detecting and blocking web app attacks.
WAF solution for hosting providers protecting web apps from common attacks.
WAF solution for hosting providers protecting web apps from common attacks.
A repository of freely usable Yara rules for detection systems, with automated error detection workflows.
A repository of freely usable Yara rules for detection systems, with automated error detection workflows.
Sample detection rules and dashboards for Google Security Operations
Sample detection rules and dashboards for Google Security Operations
ModSecurity is an open-source web application firewall that provides a flexible and scalable way to monitor and control HTTP traffic.
ModSecurity is an open-source web application firewall that provides a flexible and scalable way to monitor and control HTTP traffic.
Get strategic cybersecurity insights in your inbox
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance