al0ne/suricata-rules

Suricata IDS rules to detect red team and malicious behavior like CobaltStrike, MSF, Empire, etc.

Security
Security Research

1.3K

Stars

303

Forks

Sep 13, 2018

Created

Jul 8, 2023

Last Updated

Project Analytics

Stars Growth (1 Month)

-4

-0.3% change

Avg Daily Growth (1 Month)

-0.1

stars per day

Fork/Star Ratio (All Time)

24.0%

High engagement

Lifetime Growth

0.5

stars/day over 2.7K days

Stars Over Time

Forks Over Time

Open Issues Over Time

Pull Requests Over Time

Commits Over Time

AI-Generated Tags

ids
security
signatures
suricata
suricata-rule
penetration-testing
malware-detection

Comments (0)

Sign in to leave a comment or vote

Sign In

No comments yet. Be the first to comment!

Stay in the loop

Get weekly updates on trending AI coding tools and projects.