0xrajneesh / Suricata-IDS-Home-LabLinks
This home-lab provides individuals with hands-on experience in setting up, configuring, and utilizing Suricata to enhance network security.
☆30Updated last year
Alternatives and similar repositories for Suricata-IDS-Home-Lab
Users that are interested in Suricata-IDS-Home-Lab are comparing it to the libraries listed below
Sorting:
- A powerful home-lab focused on setting up Splunk SIEM and real-world use cases. If you’re interested to become SOC Analyst(Tier 1/2) , th…☆89Updated last year
- Suricata rules that can detect a wide range of threats, including malware, exploits, and other malicious activity especially web applicat…☆59Updated last year
- Packet captures of malicious traffic for analysis using Wireshark☆63Updated 2 years ago
- Cybersecurity Security Operations Center (SOC) Analyst NOW, by EC-Council☆36Updated 2 years ago
- An offline Phishing Email Analyzer. Enabling non-techies to analyze phishing emails automatically!☆63Updated 2 years ago
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆49Updated 3 years ago
- Creation of a laboratory for malware analysis in AWS☆104Updated 3 years ago
- ☆190Updated last year
- Comprehensive adversary emulation tool for security testing on Google Cloud Platform (GCP) environments.☆14Updated last year
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆146Updated last year
- ☆35Updated last year
- A curated list of tools and resources that I use daily as a Purple-Team operator.☆92Updated 7 months ago
- Tor onion address lookup☆58Updated 3 months ago
- A collection of Malware Analysis software, materials, libraries, documents, books, resources about malware analysis in Cybersecurity.☆56Updated 2 years ago
- ☆57Updated last month
- Advanced Bash script designed for conducting digital forensics on Linux systems☆145Updated last year
- Sniffing out well-known threat groups☆64Updated last year
- If you a security engineer or an aspirant Security professional then Setting up a Wazuh home lab environment is an excellent way for SOC …☆14Updated last year
- Raw data from Threat Intelligence Reports with automatic reports collection and keyword search across thousands of reports☆143Updated last week
- Includes quick start guides for Shodan for both IT and ICS/OT assets☆136Updated 2 years ago
- This repo contains scripts to install a SIEM (Elasticsearch, Kibana and Filebeat) , HIDS (Wazuh Manager) and NIDS (Suricata)☆38Updated 10 months ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆99Updated 2 years ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆68Updated last year
- List of some cybersecurity conferences☆58Updated 3 months ago
- The best tools and resources for forensic analysis.☆165Updated 2 years ago
- Welcome to Project KillChain, a comprehensive GitHub repository for Red and Blue Teams. This repository houses tools, scripts, technique…☆110Updated last year
- This is the repository for indicators of compromise (IOCs) and other data for threat intelligence articles posted on the Palo Alto Networ…☆108Updated last month
- Building a consolidated RSS feed for articles about cyberattacks☆72Updated this week
- This tool parses Windows EVTX logs to extract login and logout sessions from a security.evtx file. It uses a Tkinter GUI to let you selec…☆32Updated 9 months ago
- Free training course offered at Hack Space Con 2023☆138Updated 2 years ago