0xrajneesh / Suricata-IDS-Home-Lab
This home-lab provides individuals with hands-on experience in setting up, configuring, and utilizing Suricata to enhance network security.
☆12Updated last year
Alternatives and similar repositories for Suricata-IDS-Home-Lab
Users that are interested in Suricata-IDS-Home-Lab are comparing it to the libraries listed below
Sorting:
- This is the repository for indicators of compromise (IOCs) and other data for threat intelligence articles posted on the Palo Alto Networ…☆23Updated last month
- CarbonBlack EDR detection rules and response actions☆71Updated 8 months ago
- Detection Engineering with YARA☆87Updated last year
- Helping Incident Responders hunt for potential persistence mechanisms on UNIX-based systems.☆15Updated last year
- ☆11Updated last year
- Raw data from Threat Intelligence Reports with automatic reports collection and keyword search across thousands of reports☆113Updated last week
- This script enhances endpoint logging telemetry for the purpose of advanced malware threat detection or for building detections or malwar…☆29Updated last month
- Documentation and tools to curate Sigma rules for Windows event logs into easier to parse rules.☆13Updated 3 months ago
- A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.☆34Updated 9 months ago
- ☆33Updated 5 months ago
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆29Updated last year
- BlueBox Malware analysis Box and Cyber threat intelligence.☆42Updated 3 years ago
- Contains compiled binaries of Volatility☆33Updated 3 months ago
- ☆20Updated last year
- ☆18Updated last month
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆51Updated 5 months ago
- IOCs from zLabs research☆18Updated 2 weeks ago
- FJTA (Forensic Journal Timeline Analyzer) is a tool that analyzes Linux filesystem (EXT4, XFS) journals (not systemd-journald), generates…☆63Updated last month
- yara detection rules for hunting with the threathunting-keywords project☆117Updated this week
- A simple tool designed to create Atomic Red Team tests with ease.☆41Updated 2 months ago
- ☆19Updated this week
- Comprehensive adversary emulation tool for security testing on Google Cloud Platform (GCP) environments.☆14Updated 10 months ago
- Cisco IOS XE implant scanning & detection (CVE-2023-20198, CVE-2023-20273)☆37Updated last year
- This repository contains a comprehensive testing designed for evaluating the performance and resilience of Endpoint Detection and Respons…☆54Updated 6 months ago
- Open IOC sharing platform☆56Updated 6 months ago
- NoDelete is a tool that assists in malware analysis by locking a folder where malware drops files before deleting them.☆47Updated 4 months ago
- ☆48Updated this week
- A small security playground implementation of GHOSTS User Simulation framework with an Active Directory deployment and Elastic.☆17Updated 9 months ago
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆73Updated 3 weeks ago
- VTC - Velociraptor Timeline Creator☆18Updated 11 months ago