Detection and Hunting Signatures Logo

Detection and Hunting Signatures

0
Free
Visit Website

A set of interrelated network and host detection rules with the aim of improving detection and hunting visibility and context. Where applicable, each Snort rule includes metadata indicating the corresponding Yara and ClamAV rules, and each Yara signature also includes metadata to the corresponding Snort and ClamAV rules, and so on. Supported Rules Currently, Snort 3, Yara and ClamAV rules are supported. Additional singatures and formats are work in progress. Scripts Currently, only scripts available are used to aid in auto-generation of hash-based and certificate-based Yara rules.

FEATURES

ALTERNATIVES

Load-balancing solution by Microsoft Azure with global infrastructure and financial guidance.

A Burp extension to detect alias traversal via NGINX misconfiguration at scale.

A low-interaction honeypot for detecting and analyzing potential attacks on Android devices via ADB over TCP/IP

Port listener / honeypot in Rust with protocol guessing, safe string display and rudimentary SQLite logging.

A Burp Suite extension that formats GraphQL requests for easier reading

A proof-of-concept for an adaptive parallelised DNS prober

Tor Browser is a free and open-source software that allows users to browse the internet anonymously and privately.

Suricata offers real-time intrusion detection, intrusion prevention, and network monitoring.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved