Flexible Network Intrusion Detection System
License: GPL-2.0-only
Formula JSON API: /api/formula/snort.json
Formula code: snort.rb
on GitHub
Bottle (binary package) installation support provided for:
Apple Silicon | sonoma | ✅ |
---|---|---|
ventura | ✅ | |
monterey | ✅ | |
Intel | sonoma | ✅ |
ventura | ✅ | |
monterey | ✅ | |
64-bit linux | ✅ |
Current versions:
stable | ✅ | 3.1.84.0 |
head | ⚡️ | HEAD |
Depends on:
daq | 3.0.14 | Network intrusion prevention and detection system |
gperftools | 2.15 | Multi-threaded malloc() and performance analysis tools |
hwloc | 2.10.0 | Portable abstraction of the hierarchical topology of modern architectures |
libdnet | 1.18.0 | Portable low-level networking library |
libpcap | 1.10.4 | Portable library for network traffic capture |
luajit | 2.1.1713773202 | Just-In-Time Compiler (JIT) for the Lua programming language |
openssl@3 | 3.3.0 | Cryptography and SSL/TLS Toolkit |
pcre | 8.45 | Perl compatible regular expressions library |
xz | 5.4.6 | General-purpose data compression with high compression ratio |
vectorscan | 5.4.11 | High-performance regular expression matching library |
Depends on when building from source:
cmake | 3.29.2 | Cross-platform make |
flex | 2.6.4 | Fast Lexical Analyzer, generates Scanners (tokenizers) |
pkg-config | 0.29.2 | Manage compile and link flags for libraries |
For snort to be functional, you need to update the permissions for /dev/bpf* so that they can be read by non-root users. This can be done manually using: sudo chmod o+r /dev/bpf* or you could create a startup item to do this for you. |
Analytics:
Installs (30 days) | |
---|---|
snort |
356 |
Installs on Request (30 days) | |
snort |
356 |
Build Errors (30 days) | |
snort |
0 |
Installs (90 days) | |
snort |
986 |
snort --HEAD |
1 |
Installs on Request (90 days) | |
snort |
986 |
snort --HEAD |
1 |
Installs (365 days) | |
snort |
4,015 |
snort --HEAD |
5 |
Installs on Request (365 days) | |
snort |
4,013 |
snort --HEAD |
5 |