0xrajneesh / Suricata-IDS-Home-LabView external linksLinks
This home-lab provides individuals with hands-on experience in setting up, configuring, and utilizing Suricata to enhance network security.
☆30Apr 10, 2024Updated last year
Alternatives and similar repositories for Suricata-IDS-Home-Lab
Users that are interested in Suricata-IDS-Home-Lab are comparing it to the libraries listed below
Sorting:
- If you a security engineer or an aspirant Security professional then Setting up a Wazuh home lab environment is an excellent way for SOC …☆17Mar 27, 2024Updated last year
- 📚A curated list of product security resources.☆22Jun 11, 2025Updated 8 months ago
- ☆20Apr 10, 2025Updated 10 months ago
- The Kill-The-Code Python Program provides a robust mechanism for remotely controlling code execution by monitoring a specified URL for a …☆18Aug 7, 2024Updated last year
- ESP32_wroom_32u WarDriver☆15Aug 25, 2023Updated 2 years ago
- Smarter Asset Search, Faster Information Extraction ZoomEye GPT is a browser extension designed specifically for cybersecurity profession…☆24Apr 30, 2025Updated 9 months ago
- A powerful home-lab focused on setting up Splunk SIEM and real-world use cases. If you’re interested to become SOC Analyst(Tier 1/2) , th…☆95Apr 3, 2024Updated last year
- New Framework Red Team Operations☆20Jun 7, 2021Updated 4 years ago
- A powerful and fully automated bot designed to help users complete various Discord tasks efficiently. The bot supports multiple quest typ…☆28Jan 28, 2026Updated 2 weeks ago
- This repository contains the best fuzzing wordlist files☆34Dec 2, 2024Updated last year
- CarbonBlack EDR detection rules and response actions☆73Sep 10, 2024Updated last year
- Bug Bounty ultimate tool☆29Dec 3, 2025Updated 2 months ago
- Config files for my GitHub profile.☆14Oct 5, 2025Updated 4 months ago
- Top 100 Hacking & Security E-Books (Free Download)☆10Feb 26, 2021Updated 4 years ago
- Web Recon Tool 🔍 An efficient reconnaissance tool for security researchers, ethical hackers, and developers to gather vital information …☆25Nov 17, 2024Updated last year
- Penstaller: A Python tool to automate the installation of essential bug bounty and pentesting tools. With one command, it sets up tools f…☆17Mar 14, 2025Updated 11 months ago
- multi-threaded script uses VirusTotal and AbuseIPDB APIs and generate an excel with all needed data☆10Mar 14, 2023Updated 2 years ago
- Greenbone Security Assistant HTTP Server - The server talking to the Greenbone Vulnerability Management daemon (gvmd).☆21Updated this week
- A Java library that extends Jakarta Bean Validation capabilities to enable cross-field validation.☆11Nov 2, 2024Updated last year
- ☆10Jul 1, 2023Updated 2 years ago
- Collection of my CTF Writeups, mostly Indonesian CTFs☆13Jan 15, 2024Updated 2 years ago
- CriminalIP is a threat intelligence service that provides detailed information about IP addresses, domains, and other network elements.☆13Aug 20, 2024Updated last year
- Gametech STMM MMTC Yogyakarta Game Developer Roadmap (*prototype)☆11Nov 30, 2023Updated 2 years ago
- Esta es una extensión del proyecto original de Avilla Forensics☆12Nov 18, 2025Updated 2 months ago
- ☆15Aug 7, 2025Updated 6 months ago
- ☆11May 30, 2021Updated 4 years ago
- Naehrig, Niederhagen and Schwabe's pairings code, massaged into a shared library.☆17Apr 19, 2016Updated 9 years ago
- RedAudit is a next-generation Windows forensic and security assessment framework featuring a live cyber-operations GUI built for real inv…☆35Nov 15, 2025Updated 3 months ago
- Test/Demo SIREKAP digits recognition☆10Feb 23, 2024Updated last year
- ☆12Mar 1, 2021Updated 4 years ago
- ☆15Apr 10, 2025Updated 10 months ago
- A browser extension that helps users shop online with various utility features.☆14Jan 9, 2025Updated last year
- Blockchain: Understanding Its Uses and Implications - Linux Foundation - LFS170x☆12Oct 26, 2024Updated last year
- A repository dedicated to deliver a comprehensive set of tools for integration and convenient use of Kaspersky Threat Intelligence servic…☆21Dec 17, 2025Updated last month
- Hack garage remote controls using HackRF One and GNU Radio☆12Dec 22, 2023Updated 2 years ago
- Modeling, analyzing and rendering attack trees.☆11Sep 9, 2021Updated 4 years ago
- HTML/XML aware reverse proxy☆18Jan 26, 2026Updated 3 weeks ago
- Freely available programming books☆11Jan 20, 2023Updated 3 years ago
- for spicetify-theme☆11Nov 26, 2023Updated 2 years ago