Suricata Extra Rules from the OISF Suricata Ruleset Index
-
I was wondering if it might be worth adding these extra rules into the Suricata/pfSense web-interface that OISF has in their Suricata Ruleset Index as there are now a few additional free rulesets. Manually adding them in the Extra rules field works also, just not certain if others were aware of all of them since they're not currently in the web-interface to select:
https://urlhaus.abuse.ch/downloads/urlhaus_suricata.tar.gz https://raw.githubusercontent.com/AssoEchap/stalkerware-indicators/master/generated/suricata.rules https://sslbl.abuse.ch/blacklist/sslipblacklist.tar.gz https://sslbl.abuse.ch/blacklist/ja3_fingerprints.tar.gz https://openinfosecfoundation.org/rules/trafficid/trafficid.rules https://raw.githubusercontent.com/ptresearch/AttackDetection/master/pt.rules.tar.gz https://security.etnetera.cz/feeds/etn_aggressive.rules https://github.com/travisbgreen/hunting-rules/raw/master/hunting.rules.tar.gz https://malsilo.gitlab.io/feeds/dumps/malsilo.rules.tar.gz https://rules.ptsecurity.com/files/ptopen.rules.tar.gz https://raw.githubusercontent.com/aleksibovellan/opnsense-suricata-nmaps/main/local.rules https://raw.githubusercontent.com/julioliraup/Antiphishing/refs/heads/main/antiphishing.rules https://rules.pawpatrules.fr/suricata/paw-patrules.tar.gz
-
I am very reluctant to add rules to the package containing a URL with "githubusercontent.com" as the repository because those can disappear as suddenly as they appeared. They are maintained by users generally, and those users could lose interest in future support.
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.