This is share svg Share this item

Suricata (MUSL)

Suricata is the leading independent open source threat detection engine


Qpython39 is required for rules update database

all files are within /opt/Suricata

/opt/Suricata/bin/suricata-update (to update rules)

listen by default on ETH0 (modifiy /opt/Suricata/ for modification)
command line information in txt file /opt/Suricata/usage.txt

logs : /opt/Suricata/var/log/suricata

Suricata is the leading independent open source threat detection engine. By combining intrusion detection (IDS), intrusion prevention (IPS), network security monitoring (NSM) and PCAP processing, Suricata can quickly identify, stop, and assess the most sophisticated attacks.

Always one step ahead
Our community of developers ensures Suricata remains on the cutting edge of threat detection and response. They prioritize security, usability, and efficiency to keep your network safe from sophisticated and emerging threats.

Plays well with others
Suricata integrates seamlessly with your network and can be embedded within numerous respected commercial and open source solutions.

Independence day is every day
The Suricata project and code are owned and supported by the Open Information Security Foundation (OISF), a non-profit that is committed to keeping Suricata open source forever.

Your gratitude and finance will help me to continue integration of this QPKG and maintain up to date versions.

Contact the Author

No older version