SigInt-Hombre v1 / dynamic Suricata detection rules from real-time threat feeds
SigInt-Hombre是一款由malvuln开发的工具,从URLhaus获取实时威胁指标,生成Suricata检测规则,并部署到Security Onion平台进行实时网络监控,覆盖HTTP、HTTPS和DNS三个层面。 2026-1-6 06:58:12 Author: seclists.org(查看原文) 阅读量:5 收藏

fulldisclosure logo

Full Disclosure mailing list archives


From: malvuln <malvuln13 () gmail com>
Date: Mon, 5 Jan 2026 23:20:59 -0500

SigInt-Hombre, generates derived Suricata detection rules from live
URLhaus threat indicators at runtime and deploy them to the Security
Onion platform for high-coverage real-time network monitoring.

https://github.com/malvuln/sigint-hombre

What it does:
Pulls the public URLhaus feed in real time (not mirrored or redistributed)

Skips:
Comments, empty lines, malformed URLs, and feed self-references
Normalizes and extracts:

Protocol, host, URI path, and port
Deduplicates hosts into consistent rule keys

Generates original, derived Suricata alerts for 3 layers:
HTTP → host + URI path, any port if none is specified (max coverage)
TLS → HTTPS detection via SNI (tls.sni) only
DNS → domain lookup visibility via dns.query

Deduplication logic:
HTTP → (host, path)
HTTPS/TLS → host
DNS → host

Writes all alerts into a single combined rule file
Restarts Suricata rules (so-suricata-restart --force)

Malvuln
_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: https://seclists.org/fulldisclosure/

Current thread:

  • SigInt-Hombre v1 / dynamic Suricata detection rules from real-time threat feeds malvuln (Jan 05)

文章来源: https://seclists.org/fulldisclosure/2026/Jan/2
如有侵权请联系:admin#unsafe.sh