Skip to content

GDATAAdvancedAnalytics/Suricata-C2

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Suricata-C2

The Suricata rules presented here are based on the blog post Detection of Command and Control Traffic Using Suricata | cyber.wtf, where we detected C2 traffic using Suricata.

Note:

  • Not all rules necessarily relate to C2 traffic.
  • Rules may need to be adjusted to fit your own infrastructure.
  • Tested with Suricata 7.

Feel free to contribute to help detect known malicious parameters with Suricata.

About

Suricata Rules to detect suspicious behavior or C2.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published