It would be cool to have a complete examples that shows how to: 1. Load rules 2. Run them against logs/attackes/whatever 3. Process/parse the results