Commonly used Suricata rulesets¶
Any source that can be downloaded in the standard Suricata ruleset format, and does not require authentication, can be added to the list of sources. Here is a list of common Suricata ruleset sources. Just verify the URL, modify as needed, and add it to your list of sources.
Corelight Labs Suricata Rules:
https://feed.corelight.com/rules/corelight.rulesET/Open:
https://rules.emergingthreats.net/open/suricata-6.0/emerging.rules.tar.gzET/Pro:
https://rules.emergingthreatspro.com/<insert-et-pro-key-here>/suricata-7.0.3/etpro.rules.tar.gzThis ruleset applies to Suricata 7.0.3, which was added in Corelight Sensor v27.11.
oisf/trafficid:
https://openinfosecfoundation.org/rules/trafficid/trafficid.rulesptresearch/attackdetection:
https://raw.githubusercontent.com/ptresearch/AttackDetection/master/pt.rules.tar.gzscwx/enhanced:
https://ws.secureworks.com/ti/ruleset/<insert-secret-code-here>/Suricata_suricata-enhanced_latest.tgzscwx/malware:
https://ws.secureworks.com/ti/ruleset/<insert-secret-code-here>/Suricata_suricata-malware_latest.tgzscwx/security:
https://ws.secureworks.com/ti/ruleset/<insert-secret-code-here>/Suricata_suricata-security_latest.tgzsslbl/ssl-fp-blacklist:
https://sslbl.abuse.ch/blacklist/sslblacklist.rulessslbl/js3-fingerprints:
https://sslbl.abuse.ch/blacklist/ja3_fingerprints.rulesetnetera/aggressive:
https://security.etnetera.cz/feeds/etn_aggressive.rulestgreen/hunting:
https://raw.githubusercontent.com/travisbgreen/hunting-rules/master/hunting.rulesmalsilo:
https://malsilo.gitlab.io/feeds/dumps/malsilo.rules.tar.gz