brew install snort
Flexible Network Intrusion Detection System
License: GPL-2.0-only
Formula JSON API: /api/formula/snort.json
Formula code: snort.rb
on GitHub
Bottle (binary package) installation support provided for:
Apple Silicon | ventura | ✅ |
---|---|---|
monterey | ✅ | |
big sur | ✅ | |
Intel | ventura | ✅ |
monterey | ✅ | |
big sur | ✅ | |
64-bit linux | ✅ |
Current versions:
stable | ✅ | 3.1.70.0 |
head | ⚡️ | HEAD |
Depends on:
daq | 3.0.12 | Network intrusion prevention and detection system |
gperftools | 2.13 | Multi-threaded malloc() and performance analysis tools |
hwloc | 2.9.2 | Portable abstraction of the hierarchical topology of modern architectures |
libdnet | 1.16.4 | Portable low-level networking library |
libpcap | 1.10.4 | Portable library for network traffic capture |
luajit | 2.1.0-beta3-20230813.2 | Just-In-Time Compiler (JIT) for the Lua programming language |
openssl@3 | 3.1.2 | Cryptography and SSL/TLS Toolkit |
pcre | 8.45 | Perl compatible regular expressions library |
xz | 5.4.4 | General-purpose data compression with high compression ratio |
hyperscan | 5.4.2 | High-performance regular expression matching library |
Depends on when building from source:
cmake | 3.27.6 | Cross-platform make |
flex | 2.6.4 | Fast Lexical Analyzer, generates Scanners (tokenizers) |
pkg-config | 0.29.2 | Manage compile and link flags for libraries |
For snort to be functional, you need to update the permissions for /dev/bpf* so that they can be read by non-root users. This can be done manually using: sudo chmod o+r /dev/bpf* or you could create a startup item to do this for you. |
Analytics:
Installs (30 days) | |
---|---|
snort |
324 |
Installs on Request (30 days) | |
snort |
323 |
Build Errors (30 days) | |
snort |
0 |
Installs (90 days) | |
snort |
891 |
Installs on Request (90 days) | |
snort |
890 |
Installs (365 days) | |
snort |
1,950 |
Installs on Request (365 days) | |
snort |
1,949 |