update lists

This commit is contained in:
2025-07-18 22:22:32 +02:00
parent 55bed3b4a1
commit 5916c5c074
3078 changed files with 331679 additions and 357255 deletions

View File

@@ -27,6 +27,7 @@ Guides</a></li>
<li><a
href="#rulesecurity-content-management-and-handling">Rule/Security
Content Management and Handling</a></li>
<li><a href="#plugins-and-extensions">Plugins and Extensions</a></li>
<li><a href="#systems-using-suricata">Systems Using Suricata</a></li>
<li><a href="#training">Training</a></li>
<li><a href="#simulation-and-testing">Simulation and Testing</a></li>
@@ -144,6 +145,12 @@ etc).</li>
<li><a
href="https://github.com/ozuriexv/SublimeSuricata">SublimeSuricata</a> -
Basic Suricata syntax highlighter for Sublime Text.</li>
<li><a
href="https://suricata-check.teuwen.net/readme.html">Suricata-Check</a>
- <code>suricata-check</code> is a command-line utility to provide
feedback on Suricata rules. It can detect issues such as covering syntax
validity, interpretability, rule specificity, rule coverage, and
efficiency.</li>
</ul>
<h2 id="documentation-and-guides">Documentation and Guides</h2>
<ul>
@@ -154,6 +161,10 @@ Extreme Performance Tuning guide.</li>
<li><a
href="https://github.com/StamusNetworks/suricata-4-analysts">suricata-4-analysts</a>
- The Security Analysts Guide to Suricata.</li>
<li><a
href="https://github.com/sidallocation/suricata-style-guide">Suricata
Community Style Guide</a> - A collaborative document to collect style
guidelines from the community of rule writers.</li>
</ul>
<h2 id="analysis-tools">Analysis Tools</h2>
<ul>
@@ -206,6 +217,12 @@ Sinkholes</a> - Suricata ruleset focused on a curated list of public
malware sinkholes (free).</li>
<li><a href="https://pawpatrules.fr">PAW Patrules</a> - Another free (CC
BY-NC-SA) collection of rules for the Suricata engine.</li>
<li><a
href="https://github.com/aleksibovellan/opnsense-suricata-nmaps">opnsense-suricata-nmaps</a>
- OPNSenses Suricata IDS/IPS Detection Rules Against NMAP Scans.</li>
<li><a
href="https://github.com/julioliraup/Antiphishing">Antiphishing</a> -
Suricata rules and datasets to detect phishing attacks.</li>
</ul>
<h2 id="rulesecurity-content-management-and-handling">Rule/Security
Content Management and Handling</h2>
@@ -236,6 +253,12 @@ Simple Python program that allows for the filtering and modifying of
Suricata and Snort rulesets based on interpreted key-value pairs present
in the metadata keyword within each rule.</li>
</ul>
<h2 id="plugins-and-extensions">Plugins and Extensions</h2>
<ul>
<li><a
href="https://github.com/catenacyber/suricata-zabbix">suricata-zabbix</a>
- Zabbix application layer plugin for Suricata.</li>
</ul>
<h2 id="systems-using-suricata">Systems Using Suricata</h2>
<ul>
<li><a href="https://github.com/StamusNetworks/SELKS">SELKS</a> - A
@@ -288,4 +311,9 @@ and, based on alerts, adds an ip-address to the MikroTik Address Lists
for a specified time for subsequent blocking.</li>
<li><a href="https://github.com/control-owl/suriGUI">suriGUI</a> - GUI
for Suricata + Qubes OS.</li>
<li><a href="https://github.com/SEc-123/SuriGuard1">SuriGuard</a> -
Web-based management system for Suricata IDS/IPS, featuring advanced
analytics and visualization capabilities.</li>
</ul>
<p><a href="https://github.com/satta/awesome-suricata">suricata.md
Github</a></p>