0xrajneesh / Suricata-IDS-Home-LabLinks
This home-lab provides individuals with hands-on experience in setting up, configuring, and utilizing Suricata to enhance network security.
☆20Updated last year
Alternatives and similar repositories for Suricata-IDS-Home-Lab
Users that are interested in Suricata-IDS-Home-Lab are comparing it to the libraries listed below
Sorting:
- ☆35Updated 9 months ago
- This is the repository for indicators of compromise (IOCs) and other data for threat intelligence articles posted on the Palo Alto Networ…☆92Updated 3 weeks ago
- Comprehensive adversary emulation tool for security testing on Google Cloud Platform (GCP) environments.☆14Updated last year
- An offline Phishing Email Analyzer. Enabling non-techies to analyze phishing emails automatically!☆64Updated last year
- Free training course offered at Hack Space Con 2023☆138Updated 2 years ago
- CarbonBlack EDR detection rules and response actions☆71Updated 11 months ago
- This tool parses Windows EVTX logs to extract login and logout sessions from a security.evtx file. It uses a Tkinter GUI to let you selec…☆31Updated 6 months ago
- This repository contains a comprehensive testing designed for evaluating the performance and resilience of Endpoint Detection and Respons…☆57Updated 10 months ago
- Repository of tools and resources for analyzing Docker containers☆68Updated last year
- Raw data from Threat Intelligence Reports with automatic reports collection and keyword search across thousands of reports☆134Updated this week
- This Repository consists all Public Cheatsheets created by BlackPerl DFIR Content Team☆19Updated 10 months ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆125Updated last year
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆67Updated last year
- Scripts for importing threat feeds and CTI articles, blogs, and reports into MISP.☆17Updated 2 months ago
- Bash Script to extract GNU/Linux forensic artifacts for digital forensic analysis and incident response.☆43Updated 2 years ago
- Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Group☆86Updated 7 months ago
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆78Updated 4 months ago
- IOCs collected during day-to-day activities☆73Updated this week
- ☆53Updated 2 weeks ago
- BlueBox Malware analysis Box and Cyber threat intelligence.☆43Updated 3 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆54Updated 8 months ago
- ☆53Updated last week
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆157Updated 4 months ago
- A network logging tool that logs per process activities☆32Updated 2 years ago
- ☆21Updated 2 years ago
- A powerful home-lab focused on setting up Splunk SIEM and real-world use cases. If you’re interested to become SOC Analyst(Tier 1/2) , th…☆78Updated last year
- SIEM Cheat Sheet☆76Updated 2 years ago
- God Mode Detection Rules☆134Updated last year
- Packet captures of malicious traffic for analysis using Wireshark☆60Updated 2 years ago
- If you a security engineer or an aspirant Security professional then Setting up a Wazuh home lab environment is an excellent way for SOC …☆13Updated last year