snort-rules VS pulledpork

Compare snort-rules vs pulledpork and see what are their differences.

snort-rules

An UNOFFICIAL Git Repository of Snort Rules(IDS rules) Releases. [UnavailableForLegalReasons - Repository access blocked] (by codecat007)

pulledpork

Pulled Pork for Snort and Suricata rule management (from Google code) (by shirkdog)
InfluxDB - Power Real-Time Data Analytics at Scale
Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
www.influxdata.com
featured
SaaSHub - Software Alternatives and Reviews
SaaSHub helps you find the best software and product alternatives
www.saashub.com
featured
snort-rules pulledpork
1 2
153 415
- -
3.8 0.0
about 3 years ago almost 3 years ago
C Perl
- GNU General Public License v3.0 only
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

snort-rules

Posts with mentions or reviews of snort-rules. We have used some of these posts to build our list of alternatives and similar projects.

pulledpork

Posts with mentions or reviews of pulledpork. We have used some of these posts to build our list of alternatives and similar projects.
  • Getting a lot of BF attempts on my server, any tips/ways to cut this out?
    1 project | /r/Fedora | 3 Jul 2021
    Snort on the other hand is a real full-featured IPS and much more powerful. Using them together can offload the processing work Snort needs to do though. You can use something like pulledpork to automatically update various rulesets for Snort as well (community, Talos (Cisco), etc.). Snort is also a big part of Cisco's FirePower firewalls.
  • Rules update during system installation
    1 project | /r/snort | 16 Feb 2021
    In the Github issues section, there's a 3 year old, still Open "Process Snort 3 Rules (https://github.com/shirkdog/pulledpork/issues/297)" issue. So that would get me questioning how they got it working in the guide at all...

What are some alternatives?

When comparing snort-rules and pulledpork you can also consider the following projects:

Wazuh - Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.

tpotce - 🍯 T-Pot - The All In One Honeypot Platform 🐝 [Moved to: https://github.com/telekom-security/tpotce]

Suricata - Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine developed by the OISF and the Suricata community.

Munin - Main repository for munin master / node / plugins

security-onion - Security Onion 16.04 - Linux distro for threat hunting, enterprise security monitoring, and log management

Rsnapshot - a tool for backing up your data using rsync (if you want to get help, use https://lists.sourceforge.net/lists/listinfo/rsnapshot-discuss)

Fail2Ban - Daemon to ban hosts that cause multiple authentication errors

OSSEC - OSSEC is an Open Source Host-based Intrusion Detection System that performs log analysis, file integrity checking, policy monitoring, rootkit detection, real-time alerting and active response.

py-idstools - idstools: Snort and Suricata Rule and Event Utilities in Python (Including a Rule Update Tool)