There are 3 repositories under snort-rules topic.
Signatures and IoCs from public Volexity blog posts.
Guidance for mitigating obsolete Transport Layer Security configurations. #nsacyber
A website and framework for testing NIDS detection
Collection of Suricata rule sets that I use modified to my environments.
Convert snort IPS signatures to FortiGate custom IPS signature syntax.
This is an open source Snort rules repository
Collection of Snort 2/3 rules.
Pure python parser for Snort/Suricata rules.
Contains all snort configurations with 'drop' rules.
IDS Snort Alert Bot Telegram Using Shell Bash GNU/Linux
Golang Suricata/Snort rules parser and generator
This work focuses on the detection of XSS attack using intrusion detection system. Here attack signature is utilized to detect XSS attack. To test the usefulness and effectiveness of proposed work a proof of concept prototype has been implemented using SNORT IDS. It is observed that proposed system correctly detected XSS attack.
Some of my bash scripts
Snort/Suricata rule syntax highlighting for GTK-based text editors (gedit)
Minimal manifest and installations of Talos LightSPD distributions for Snort 3.
Sistem deteksi dan peringatan BitTorrent dengan Snort dan bot Telegram pada jaringan virtual yang dibuat dengan VirtualBox, Ubuntu Server 20.04, MySQL, barnyard2, transmission daemon, dan bash.
Praktek IDS (Intrusion Detection System) menggunakan Snort di Ubuntu