{"payload":{"pageCount":1,"repositories":[{"type":"Public","name":"suricata","owner":"OISF","isFork":false,"description":"Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine developed by the OISF and the Suricata community.","allTopics":["cybersecurity","suricata","ids","network-monitoring","threat-hunting","nsm","ips","intrusion-detection-system","network-monitor","intrusion-prevention-system","security"],"primaryLanguage":{"name":"C","color":"#555555"},"pullRequestCount":65,"issueCount":0,"starsCount":4491,"forksCount":1430,"license":"GNU General Public License v2.0","participation":[17,15,11,11,9,16,33,45,39,32,21,27,15,32,31,18,12,25,33,44,23,34,24,25,30,57,38,26,35,30,16,14,32,40,27,26,15,32,21,14,26,13,3,17,1,16,2,41,6,6,9,2],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-09-26T14:58:28.720Z"}},{"type":"Public","name":"suricata-verify","owner":"OISF","isFork":false,"description":"Suricata Verification Tests - Testing Suricata Output","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":30,"issueCount":0,"starsCount":100,"forksCount":88,"license":"MIT License","participation":[1,5,0,4,2,3,10,5,8,8,6,3,1,1,1,3,7,5,3,4,2,3,5,4,5,4,3,4,8,8,4,5,4,12,10,8,5,5,7,32,4,3,2,2,0,6,0,2,3,4,1,3],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-09-26T04:45:37.350Z"}},{"type":"Public","name":"libhtp","owner":"OISF","isFork":false,"description":"LibHTP is a security-aware parser for the HTTP protocol and the related bits and pieces. ","allTopics":[],"primaryLanguage":{"name":"C++","color":"#f34b7d"},"pullRequestCount":2,"issueCount":8,"starsCount":288,"forksCount":115,"license":"BSD 3-Clause \"New\" or \"Revised\" License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-09-20T09:26:23.568Z"}},{"type":"Public","name":"suricata-intel-index","owner":"OISF","isFork":false,"description":"Suricata rule and intel index","allTopics":["rules","security","intel","suricata","ids","signatures","nsm","ips"],"primaryLanguage":null,"pullRequestCount":2,"issueCount":0,"starsCount":28,"forksCount":17,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-08-15T14:24:38.313Z"}},{"type":"Public","name":"suricata-update","owner":"OISF","isFork":false,"description":"The tool for updating your Suricata rules.","allTopics":["security","suricata","ids","network-monitoring","nsm","ips"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":13,"issueCount":0,"starsCount":251,"forksCount":93,"license":"GNU General Public License v2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-07-10T09:21:17.198Z"}},{"type":"Public","name":"suricata-trafficid","owner":"OISF","isFork":false,"description":"Application and service identification rules for Suricata","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":3,"issueCount":0,"starsCount":17,"forksCount":9,"license":"GNU General Public License v2.0","participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-11-07T13:31:04.808Z"}}],"repositoryCount":6,"userInfo":null,"searchable":true,"definitions":[],"typeFilters":[{"id":"all","text":"All"},{"id":"public","text":"Public"},{"id":"source","text":"Sources"},{"id":"fork","text":"Forks"},{"id":"archived","text":"Archived"},{"id":"template","text":"Templates"}],"compactMode":false},"title":"OISF repositories"}