update lists

This commit is contained in:
2025-07-18 22:22:32 +02:00
parent 55bed3b4a1
commit 5916c5c074
3078 changed files with 331679 additions and 357255 deletions

View File

@@ -1,4 +1,4 @@
 Awesome Suricata !Awesome (https://awesome.re/badge-flat2.svg) (https://awesome.re)
 Awesome Suricata !Awesome (https://awesome.re/badge-flat2.svg) (https://awesome.re)
 (https://suricata.io)
@@ -18,6 +18,7 @@
- Analysis Tools (#analysis-tools)
- Rule Sets (#rule-sets)
- Rule/Security Content Management and Handling (#rulesecurity-content-management-and-handling)
- Plugins and Extensions (#plugins-and-extensions)
- Systems Using Suricata (#systems-using-suricata)
- Training (#training)
- Simulation and Testing (#simulation-and-testing)
@@ -53,6 +54,7 @@
- InfluxDB Suricata Input Plugin (https://github.com/influxdata/telegraf/tree/master/plugins/inputs/suricata) - Input Plugin for Telegraf to collect and forward Suricata stats logs (included out of the box in recent Telegraf releases).
- suricata_exporter (https://github.com/corelight/suricata_exporter) - Simple Prometheus exporter written in Go exporting stats metrics scraped from Suricata socket.
Programming Libraries and Toolkits
- rust-suricatax-rule-parser (https://github.com/jasonish/rust-suricatax-rule-parser) - Experimental Suricata Rule Parser in Rust.
@@ -73,18 +75,20 @@
Development Tools
- Suricata Language Server (https://github.com/StamusNetworks/suricata-language-server) - Suricata Language Server is an implementation of the Language Server Protocol for Suricata signatures. It adds syntax check, hints and 
auto-completion to your preferred editor once it is configured.
- Suricata Language Server (https://github.com/StamusNetworks/suricata-language-server) - Suricata Language Server is an implementation of the Language Server Protocol for Suricata signatures. It adds syntax check, hints and auto-completion to 
your preferred editor once it is configured.
- suricata-ls-vscode (https://github.com/StamusNetworks/suricata-ls-vscode) - Suricata IntelliSense Extension using the Suricata Language Server.
- suricata-highlight-vscode (https://github.com/dgenzer/suricata-highlight-vscode) - Suricata Rules Support for Visual Studio Code (syntax highlighting, etc).
- SublimeSuricata (https://github.com/ozuriexv/SublimeSuricata) - Basic Suricata syntax highlighter for Sublime Text.
- Suricata-Check (https://suricata-check.teuwen.net/readme.html) - suricata-check is a command-line utility to provide feedback on Suricata rules. It can detect issues such as covering syntax validity, interpretability, rule specificity, rule 
coverage, and efficiency.
Documentation and Guides
- SEPTun (https://github.com/pevma/SEPTun) - Suricata Extreme Performance Tuning guide.
- SEPTun-Mark-II (https://github.com/pevma/SEPTun-Mark-II) - Suricata Extreme Performance Tuning guide - Mark II.
- suricata-4-analysts (https://github.com/StamusNetworks/suricata-4-analysts) - The Security Analyst's Guide to Suricata.
- Suricata Community Style Guide (https://github.com/sidallocation/suricata-style-guide) - A collaborative document to collect style guidelines from the community of rule writers.
Analysis Tools
@@ -109,6 +113,8 @@
- 3CORESec NIDS - Lateral Movement (https://dtection.io/ruleset/3cs_lateral) - Suricata ruleset focusing on lateral movement techniques (paid).
- 3CORESec NIDS - Sinkholes (https://dtection.io/ruleset/3cs_sinkholes) - Suricata ruleset focused on a curated list of public malware sinkholes (free).
- PAW Patrules (https://pawpatrules.fr) - Another free (CC BY-NC-SA) collection of rules for the Suricata engine.
- opnsense-suricata-nmaps (https://github.com/aleksibovellan/opnsense-suricata-nmaps) - OPNSense's Suricata IDS/IPS Detection Rules Against NMAP Scans.
- Antiphishing (https://github.com/julioliraup/Antiphishing) - Suricata rules and datasets to detect phishing attacks.
Rule/Security Content Management and Handling
@@ -121,8 +127,12 @@
- surify-cli (https://github.com/dgenzer/surify-cli) - Generate suricata-rules from collection of IOCs (JSON, CSV or flags) based on your suricata template.
- suricata-prettifier (https://github.com/theY4Kman/suricata-prettifier) - Command-line tool to format and syntax highlight Suricata rules.
- OTX-Suricata (https://github.com/AlienVault-OTX/OTX-Suricata) - Create rules and configuration for Suricata to alert on indicators from an OTX account.
- Aristotle (https://github.com/secureworks/aristotle) - Simple Python program that allows for the filtering and modifying of Suricata and Snort rulesets based on interpreted key-value pairs present in the metadata keyword within each 
rule.
- Aristotle (https://github.com/secureworks/aristotle) - Simple Python program that allows for the filtering and modifying of Suricata and Snort rulesets based on interpreted key-value pairs present in the metadata keyword within each rule.
Plugins and Extensions
- suricata-zabbix (https://github.com/catenacyber/suricata-zabbix) - Zabbix application layer plugin for Suricata.
Systems Using Suricata
@@ -154,6 +164,8 @@
Misc
- Suriwire (https://github.com/regit/suriwire) - Wireshark plugin to display Suricata analysis info.
- bash_cata (https://github.com/isMTv/bash_cata) - A simple script that processes the generated Suricata eve-log in real time and, based on alerts, adds an ip-address to the MikroTik Address Lists for a specified time for subsequent 
blocking.
- bash_cata (https://github.com/isMTv/bash_cata) - A simple script that processes the generated Suricata eve-log in real time and, based on alerts, adds an ip-address to the MikroTik Address Lists for a specified time for subsequent blocking.
- suriGUI (https://github.com/control-owl/suriGUI) - GUI for Suricata + Qubes OS.
- SuriGuard (https://github.com/SEc-123/SuriGuard1) - Web-based management system for Suricata IDS/IPS, featuring advanced analytics and visualization capabilities.
suricata Github: https://github.com/satta/awesome-suricata