0x4d4c / inetsim-dockerizedLinks
Dockerized version of INetSim
☆20Updated 2 years ago
Alternatives and similar repositories for inetsim-dockerized
Users that are interested in inetsim-dockerized are comparing it to the libraries listed below
Sorting:
- This repository contains Dockerfiles for building Docker images of popular malware analysis tools, which are distributed through the REMn…☆292Updated this week
- SCAP Scanner And Tailoring Graphical User Interface☆234Updated last year
- A docker container for openvas☆69Updated 5 years ago
- Cuckoo Sandbox Dockerfile☆332Updated 5 years ago
- setup zeek, previously Bro IDS☆18Updated last week
- IRMA is an asynchronous & customizable analysis system for suspicious files.☆278Updated 2 years ago
- Docker files for Security Onion☆42Updated 5 years ago
- Documentation and specifications☆202Updated last year
- A library and a tool for converting audit logs to XML and JSON☆46Updated 8 years ago
- Ansible playbook automation for pfelk☆23Updated 4 years ago
- Suricata Extreme Performance Tuning guide☆213Updated 7 years ago
- Cyber Defence Monitoring Course Suite :: Suricata, Arkime (and others in the past)☆108Updated last year
- Zeek package for tracking long connections to report them before they have completed.☆31Updated 2 months ago
- Automated Docker MISP container - Malware Information Sharing Platform and Threat Sharing☆177Updated 4 years ago
- Zeek IDS Dockerfile☆101Updated 3 years ago
- ☆49Updated 10 years ago
- File Access Policy Daemon☆231Updated this week
- Tool for managing Zeek deployments.☆60Updated 2 weeks ago
- Linux file read monitor☆91Updated 2 years ago
- OwlH Master API☆24Updated 9 months ago
- Automated deployment scripts for the RockNSM network hunting distribution.☆457Updated 2 years ago
- Expandable Defensive Cyber Operations Platform☆44Updated 3 years ago
- Docker files for building Zeek.☆89Updated 2 years ago
- Bro IDS Dockerfile☆129Updated 6 years ago
- osquery extensions by Trail of Bits☆269Updated 2 years ago
- Pulled Pork for Snort and Suricata rule management (from Google code)☆442Updated 4 years ago
- Ansible role to setup Falco, behavioral security with sysdig☆44Updated this week
- Logstash Configuration for Linux Logs (Authentication, Apache, Mail)☆92Updated 6 years ago
- Graylog Processing Pipeline functions to enrich log messages with IoC information from threat intelligence databases☆155Updated last year
- HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints…☆545Updated 9 months ago