https://
rules.emergingthreats.net/
open/suricata/rules/emerging-
misc.rules
These rules contain different vulnerabilities signatures.
https://
rules.emergingthreats.net/
open/suricata/rules/emerging-
mobile_malware.rules
These rules contain malware signatures for mobile platforms.
https://
rules.emergingthreats.net/
open/suricata/rules/emerging-
netbios.rules
These rules contain signatures of vulnerabilities in the NetBIOS protocol, signs of
incorrect use of the NetBIOS protocol.
https://
rules.emergingthreats.net/
open/suricata/rules/emerging-
p2p.rules
These rules describe signs of access to P2P networks (Bittorrent, Gnutella, Limewire).
https://
rules.emergingthreats.net/
open/suricata/rules/emerging-
policy.rules
These rules describe unwanted network activity (access to MySpace, Ebay).
https://
rules.emergingthreats.net/
open/suricata/rules/emerging-
poprules
These rules contain signatures of vulnerabilities in the POP3 protocol, signs of
incorrect use of the POP3 protocol.
https://
rules.emergingthreats.net/
open/suricata/rules/emerging-
rpc.rules
These rules contain signatures of vulnerabilities in the RPC protocol, signs of
incorrect use of the RPC protocol.
https://
rules.emergingthreats.net/
open/suricata/rules/emerging-
scada.rules
These rules contain vulnerability signatures for SCADA systems.
https://
rules.emergingthreats.net/
open/suricata/rules/emerging-
scan.rules
These rules describe signs of activity associated with network scanning (Nessus,
Nikto, portscanning).
https://
rules.emergingthreats.net/
open/suricata/rules/emerging-
shellcode.rules
These rules describe signs of activity associated with attempts to gain shell access
as a result of exploits.