Scirius is a web application for Suricata ruleset management and threat hunting.
-
Updated
Aug 19, 2025 - Python
Scirius is a web application for Suricata ruleset management and threat hunting.
Signatures and IoCs from public Volexity blog posts.
A website and framework for testing NIDS detection
BlackBerry Threat Research & Intelligence
S2AN - Mapper of Sigma/Suricata Rules/Signatures ➡️ MITRE ATT&CK Navigator
OPNSense's Suricata IDS/IPS Detection Rules Against NMAP Scans
Mapping NSM rules to MITRE ATT&CK
Suricata rules that can detect a wide range of threats, including malware, exploits, and other malicious activity especially web application attacks
Configuring the Suricata IDS to detect DoS attacks by adding custom rule file.
Collection of Suricata rule sets that I use modified to my environments.
Pure python parser for Snort/Suricata rules.
This home-lab provides individuals with hands-on experience in setting up, configuring, and utilizing Suricata to enhance network security.
Suricata rules for SCADA
suricata-check is a command line utility to provide feedback on Suricata rules. The tool can detect various issues including those covering syntax validity, interpretability, rule specificity, rule coverage, and efficiency.
此Suricata IDS Rules 用于检测网络攻击行为,支持常见C2工具/中间件漏洞利用/Frp隧道/HTTP隧道/TCP隧道/常见webshell/redis未授权/Shiro反序列化/Fastjson反序列化/挖矿/SQL注入等特征
A comprehensive repository for malware analysis and threat intelligence, including Cobalt Strike Beacon configurations, YARA rules, IOCs, Suricata rules, and malware samples to support cybersecurity efforts.
Golang Suricata/Snort rules parser and generator
Suricata config to apply IDPS mode on Ubuntu 18.04 LTS
Add a description, image, and links to the suricata-rules topic page so that developers can more easily learn about it.
To associate your repository with the suricata-rules topic, visit your repo's landing page and select "manage topics."