From 8f6be34d543c74d182ca75d30d492a7942434311 Mon Sep 17 00:00:00 2001 From: Jason Ish Date: Wed, 1 Nov 2023 14:33:23 -0600 Subject: [PATCH] new ruleset: pawpatrules --- index.yaml | 15 +++++++++++++++ 1 file changed, 15 insertions(+) diff --git a/index.yaml b/index.yaml index 3a6d30b..e81c7ce 100644 --- a/index.yaml +++ b/index.yaml @@ -227,6 +227,21 @@ sources: subscribe-url: https://www.stamus-networks.com/stamus-labs/subscribe-to-threat-intel-feed min-version: 6.0.0 + pawpatrules: + summary: PAW Patrules is a collection of rules for IDPS / NSM Suricata engine + description: | + PAW Patrules ruleset permit to detect many events on + network. Suspicious flow, malicious tool, unsuported and + vulnerable system, known threat actors with various IOCs, + lateral movement, bad practice, shadow IT... Rules are + frequently updated. + homepage: https://pawpatrules.fr/ + vendor: pawpatrules + min-version: 6.0.0 + url: https://rules.pawpatrules.fr/suricata/paw-patrules.tar.gz + checksum: false + license: CC-BY-SA-4.0 + versions: suricata: recommended: 7.0.3 -- 2.47.3