0xrajneesh / Suricata-IDS-Home-LabLinks
This home-lab provides individuals with hands-on experience in setting up, configuring, and utilizing Suricata to enhance network security.
☆13Updated last year
Alternatives and similar repositories for Suricata-IDS-Home-Lab
Users that are interested in Suricata-IDS-Home-Lab are comparing it to the libraries listed below
Sorting:
- 🛡️ VIPER: Stay ahead of threats with AI-driven vulnerability intelligence. Prioritize CVEs effectively using NVD, EPSS, CISA KEV, and Go…☆45Updated this week
- Online resources related to Detection Engineering. Detection rules, detection logic, attack samples, detection tests and emulation tools…☆96Updated this week
- ☆20Updated 2 years ago
- BlueBox Malware analysis Box and Cyber threat intelligence.☆42Updated 3 years ago
- Suricata rules that can detect a wide range of threats, including malware, exploits, and other malicious activity especially web applicat…☆46Updated last year
- This script enhances endpoint logging telemetry for the purpose of advanced malware threat detection or for building detections or malwar…☆31Updated 2 months ago
- Rapid7 Labs operates as the division of Rapid7 focused on threat research. It is renowned for providing comprehensive threat intelligence…☆62Updated 2 weeks ago
- Repo for experimenting and testing MCP server builds for CTI-related research.☆26Updated 3 weeks ago
- Detection Engineering with YARA☆87Updated last year
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆29Updated last year
- Have you ever wanted to search a link or IP address on multiple OSINT pages at once?☆43Updated last week
- ☆33Updated 6 months ago
- Repository of tools and resources for analyzing Docker containers☆65Updated last year
- Turn any blog into structured threat intelligence.☆32Updated this week
- ICS/OT related Wireshark profiles + adding some other (IT or OT related) Open Source Wireshark Profiles☆17Updated 2 months ago
- CarbonBlack EDR detection rules and response actions☆71Updated 8 months ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆52Updated 6 months ago
- ☆104Updated last week
- ☆48Updated 3 weeks ago
- This tool parses Windows EVTX logs to extract login and logout sessions from a security.evtx file. It uses a Tkinter GUI to let you selec…☆32Updated 3 months ago
- ☆19Updated 3 years ago
- FJTA (Forensic Journal Timeline Analyzer) is a tool that analyzes Linux filesystem (EXT4, XFS) journals (not systemd-journald), generates…☆64Updated 2 months ago
- yara detection rules for hunting with the threathunting-keywords project☆121Updated 3 weeks ago
- The Eventlog Compendium is the go-to resource for understanding Windows Event Logs.☆44Updated last month
- Jupyter Univere is a search engine for all infosec jupyter notebooks☆26Updated 2 months ago
- Packet captures of malicious traffic for analysis using Wireshark☆58Updated last year
- Helping Incident Responders hunt for potential persistence mechanisms on UNIX-based systems.☆15Updated last year
- Comprehensive adversary emulation tool for security testing on Google Cloud Platform (GCP) environments.☆14Updated 11 months ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆64Updated last year
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆124Updated last year