0xrajneesh / Suricata-IDS-Home-LabLinks
This home-lab provides individuals with hands-on experience in setting up, configuring, and utilizing Suricata to enhance network security.
☆25Updated last year
Alternatives and similar repositories for Suricata-IDS-Home-Lab
Users that are interested in Suricata-IDS-Home-Lab are comparing it to the libraries listed below
Sorting:
- Comprehensive adversary emulation tool for security testing on Google Cloud Platform (GCP) environments.☆14Updated last year
- If you a security engineer or an aspirant Security professional then Setting up a Wazuh home lab environment is an excellent way for SOC …☆14Updated last year
- A short graduate course on cybercrime, cyberespionage, and cyberoperations☆81Updated 5 months ago
- An offline Phishing Email Analyzer. Enabling non-techies to analyze phishing emails automatically!☆64Updated 2 years ago
- This is the repository for indicators of compromise (IOCs) and other data for threat intelligence articles posted on the Palo Alto Networ…☆104Updated 2 months ago
- A collection of Malware Analysis software, materials, libraries, documents, books, resources about malware analysis in Cybersecurity.☆53Updated 2 years ago
- Advanced Bash script designed for conducting digital forensics on Linux systems☆145Updated last year
- A powerful home-lab focused on setting up Splunk SIEM and real-world use cases. If you’re interested to become SOC Analyst(Tier 1/2) , th…☆82Updated last year
- ☆25Updated 2 years ago
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆146Updated last year
- This tool parses Windows EVTX logs to extract login and logout sessions from a security.evtx file. It uses a Tkinter GUI to let you selec…☆32Updated 8 months ago
- ☆35Updated 11 months ago
- Have you ever wanted to search a link or IP address on multiple OSINT pages at once?☆58Updated 4 months ago
- Packet captures of malicious traffic for analysis using Wireshark☆62Updated 2 years ago
- Includes quick start guides for Shodan for both IT and ICS/OT assets☆135Updated 2 years ago
- Raw data from Threat Intelligence Reports with automatic reports collection and keyword search across thousands of reports☆137Updated last week
- Tor onion address lookup☆55Updated 2 months ago
- ☆52Updated 2 months ago
- ☆186Updated last year
- Scripts for importing threat feeds and CTI articles, blogs, and reports into MISP.☆17Updated 4 months ago
- Suricata rules that can detect a wide range of threats, including malware, exploits, and other malicious activity especially web applicat…☆55Updated last year
- Online resources related to Detection Engineering. Detection rules, detection logic, attack samples, detection tests and emulation tools…☆124Updated 2 months ago
- Digital Forensics Incident Response and Detection engineering: Análisis forense de artefactos comunes y no tan comunes. Técnicas anti-for…☆88Updated 2 weeks ago
- Free training course offered at Hack Space Con 2023☆139Updated 2 years ago
- Finding Missing People, extract information in Dark Web and Surfaceweb Investigation and Human Trafficking Support☆34Updated last year
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆97Updated 2 years ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆149Updated last year
- A meta-list of public references to threat actor profiles and APT group datasets.☆71Updated last month
- Sniffing out well-known threat groups☆63Updated last year
- Bash Script to extract GNU/Linux forensic artifacts for digital forensic analysis and incident response.☆43Updated 2 years ago