0xrajneesh / Suricata-IDS-Home-Lab
This home-lab provides individuals with hands-on experience in setting up, configuring, and utilizing Suricata to enhance network security.
☆11Updated 11 months ago
Alternatives and similar repositories for Suricata-IDS-Home-Lab:
Users that are interested in Suricata-IDS-Home-Lab are comparing it to the libraries listed below
- BlueBox Malware analysis Box and Cyber threat intelligence.☆40Updated 2 years ago
- ☆19Updated last year
- Comprehensive adversary emulation tool for security testing on Google Cloud Platform (GCP) environments.☆14Updated 9 months ago
- A collection of reports and case studies to understand the threat landscape for UK critical infrastructure☆38Updated last year
- Online resources related to Detection Engineering. Detection rules, detection logic, attack samples, detection tests and emulation tools…☆79Updated last week
- Open IOC sharing platform☆56Updated 4 months ago
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆29Updated 10 months ago
- ☆32Updated 4 months ago
- Suricata rules that can detect a wide range of threats, including malware, exploits, and other malicious activity especially web applicat…☆43Updated last year
- ☆32Updated last year
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆71Updated 2 months ago
- Detection rule validation☆41Updated last year
- Rapid7 Labs operates as the division of Rapid7 focused on threat research. It is renowned for providing comprehensive threat intelligence…☆59Updated last week
- ☆32Updated 2 years ago
- This is the repository for indicators of compromise (IOCs) and other data for threat intelligence articles posted on the Palo Alto Networ…☆22Updated this week
- A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.☆34Updated 8 months ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆51Updated 3 months ago
- CarbonBlack EDR detection rules and response actions☆71Updated 6 months ago
- Kubernetes, Clusters and Dockers Enumeration in GCP and AWS environments☆13Updated last year
- Repository of tools and resources for analyzing Docker containers☆63Updated last year
- Detection Engineering with YARA☆87Updated last year
- ☆10Updated last year
- This script is to build Wazuh 4.3 environment☆12Updated 2 years ago
- ☆16Updated last year
- Raw data from Threat Intelligence Reports with automatic reports collection and keyword search across thousands of reports☆101Updated this week
- Rules Shared by the Community from 100 Days of YARA 2023☆76Updated last year
- Cisco IOS XE implant scanning & detection (CVE-2023-20198, CVE-2023-20273)☆37Updated last year
- The EPSS Calculator is a user-friendly web application that calculates the EPSS (Exploit Prediction Scoring System) score based on a prov…☆11Updated 4 months ago
- ☆21Updated 2 years ago
- Contains compiled binaries of Volatility☆33Updated 2 months ago