Scirius is a web application for Suricata ruleset management and threat hunting.
-
Updated
Dec 9, 2024 - Python
Scirius is a web application for Suricata ruleset management and threat hunting.
Signatures and IoCs from public Volexity blog posts.
Suricata rules that can detect a wide range of threats, including malware, exploits, and other malicious activity especially web application attacks
Configuring the Suricata IDS to detect DoS attacks by adding custom rule file.
Pure python parser for Snort/Suricata rules.
suricata-check is a command line utility to provide feedback on Suricata rules. The tool can detect various issues including those covering syntax validity, interpretability, rule specificity, rule coverage, and efficiency.
Scirius is a web application for Suricata ruleset management.
Given a file containing a list of fully qualified DNS domains, quickburn generates IDS rules which detect those domains (and their subdomains) in DNS queries, the HTTP Host header, or TLS SNI (or all of the above!)
Add a description, image, and links to the suricata-rules topic page so that developers can more easily learn about it.
To associate your repository with the suricata-rules topic, visit your repo's landing page and select "manage topics."