SigInt-Hombre, generates derived Suricata detection rules from live URLhaus threat indicators at runtime and deploy them to the Security Onion platform for high-coverage real-time network monitoring. https://github.com/malvuln/sigint-hombre What it does: Pulls the public URLhaus feed in real time (not mirrored or redistributed) Skips: Comments, empty lines, malformed URLs, and feed self-references Normalizes and extracts: Protocol, host, URI path, and port Deduplicates hosts into consistent rule keys Generates original, derived Suricata alerts for 3 layers: HTTP → host + URI path, any port if none is specified (max coverage) TLS → HTTPS detection via SNI (tls.sni) only DNS → domain lookup visibility via dns.query Deduplication logic: HTTP → (host, path) HTTPS/TLS → host DNS → host Writes all alerts into a single combined rule file Restarts Suricata rules (so-suricata-restart --force) Malvuln
{{ x.nick }}
{{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1 {{ x.comment }} |