Snort

Explore 8 curated cybersecurity tools, with 15,538+ visitors searching for solutions

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

Filter by:
SIREN Setup Instructions Logo

Instructions for setting up SIREN, including downloading Linux dependencies, cloning the repository, setting up virtual environment, installing pip requirements, running SIREN, setting up Snort on Pi, and MySQL setup.

0
ThreatAggregator Logo

Aggregates security threats from online sources and outputs to various formats.

0
Detection and Hunting Signatures Logo

A set of interrelated detection rules for improving detection and hunting visibility and context

0
FireEye Mandiant SunBurst Countermeasures Logo

FireEye Mandiant SunBurst Countermeasures: freely available rules for detecting malicious files and activity

0
Snort++ Logo

Snort 3 is the next generation Snort IPS with enhanced features and improved cross-platform support.

0
FireEye Red Team Tool Countermeasures Logo

A set of rules for detecting threats in various formats, including Snort, Yara, ClamAV, and HXIOC.

0
snort Logo

Snort is an open source intrusion prevention system that uses rules to detect and prevent malicious network activity.

0
Malware Indicators of Compromise Logo

Provides indicators of compromise (IOCs) to combat malware with Yara and Snort rules.

0