Flexible Network Intrusion Detection System
License: GPL-2.0-only
Formula JSON API: /api/formula/snort.json
Formula code: snort.rb
on GitHub
Bottle (binary package) installation support provided for:
Apple Silicon | sequoia | ✅ |
---|---|---|
sonoma | ✅ | |
ventura | ✅ | |
Intel | sonoma | ✅ |
ventura | ✅ | |
64-bit linux | ✅ |
Current versions:
stable | ✅ | 3.5.2.0 |
head | ⚡️ | HEAD |
Depends on:
daq | 3.0.17 | Network intrusion prevention and detection system |
hwloc | 2.11.2 | Portable abstraction of the hierarchical topology of modern architectures |
jemalloc | 5.3.0 | Implementation of malloc emphasizing fragmentation avoidance |
libdnet | 1.18.0 | Portable low-level networking library |
libpcap | 1.10.5 | Portable library for network traffic capture |
luajit | 2.1.1731601260 | Just-In-Time Compiler (JIT) for the Lua programming language |
openssl@3 | 3.4.0 | Cryptography and SSL/TLS Toolkit |
pcre | 8.45 | Perl compatible regular expressions library |
vectorscan | 5.4.11 | High-performance regular expression matching library |
xz | 5.6.3 | General-purpose data compression with high compression ratio |
Depends on when building from source:
cmake | 3.31.0 | Cross-platform make |
flex | 2.6.4 | Fast Lexical Analyzer, generates Scanners (tokenizers) |
pkgconf | 2.3.0 | Package compiler and linker metadata toolkit |
For snort to be functional, you need to update the permissions for /dev/bpf* so that they can be read by non-root users. This can be done manually using: sudo chmod o+r /dev/bpf* or you could create a startup item to do this for you. |
Analytics:
Installs (30 days) | |
---|---|
snort |
365 |
snort --HEAD |
1 |
Installs on Request (30 days) | |
snort |
365 |
snort --HEAD |
1 |
Build Errors (30 days) | |
snort |
1 |
Installs (90 days) | |
snort |
1,115 |
snort --HEAD |
1 |
Installs on Request (90 days) | |
snort |
1,115 |
snort --HEAD |
1 |
Installs (365 days) | |
snort |
4,104 |
snort --HEAD |
4 |
Installs on Request (365 days) | |
snort |
4,102 |
snort --HEAD |
4 |