https://
rules.emergingthreats.net/
open/suricata/rules/emerging-
smtp.rules
These rules contain signatures of vulnerabilities in the SMTP protocol, signs of
incorrect use of the SMTP protocol.
https://
rules.emergingthreats.net/
open/suricata/rules/emerging-
sql.rules
These rules contain vulnerability signatures for SQL DBMS.
https://
rules.emergingthreats.net/
open/suricata/rules/emerging-
telnet.rules
These rules contain signatures of vulnerabilities in the telnet protocol, signs of
incorrect use of the telnet protocol.
https://
rules.emergingthreats.net/
open/suricata/rules/emerging-
tftp.rules
These rules contain signatures of vulnerabilities in the TFTP protocol, signs of
incorrect use of the TFTP protocol.
https://
rules.emergingthreats.net/
open/suricata/rules/emerging-
trojan.rules
These rules contain signs of network activity of Trojans.
https://
rules.emergingthreats.net/
open/suricata/rules/emerging-
user_agents.rules
These rules contain signs of suspicious and potentially dangerous HTTP clients
(identified by the values in the User-Agent HTTP header).
https://
rules.emergingthreats.net/
open/suricata/rules/emerging-
l.rules
These rules contain vulnerability signatures for VOIP protocol.
https://
rules.emergingthreats.net/
open/suricata/rules/emerging-
web_client.rules
These rules contain vulnerability signatures for WEB clients.
https://
rules.emergingthreats.net/
open/suricata/rules/emerging-
web_server.rules
These rules contain vulnerability signatures for WEB servers.
https://
rules.emergingthreats.net/
open/suricata/rules/emerging-
web_specific_apps.rules
These rules contain vulnerability exploitation signatures for WEB applications.