0xrajneesh / Suricata-IDS-Home-LabLinks
This home-lab provides individuals with hands-on experience in setting up, configuring, and utilizing Suricata to enhance network security.
☆30Updated last year
Alternatives and similar repositories for Suricata-IDS-Home-Lab
Users that are interested in Suricata-IDS-Home-Lab are comparing it to the libraries listed below
Sorting:
- Cybersecurity Security Operations Center (SOC) Analyst NOW, by EC-Council☆39Updated 2 years ago
- A powerful home-lab focused on setting up Splunk SIEM and real-world use cases. If you’re interested to become SOC Analyst(Tier 1/2) , th…☆91Updated last year
- An offline Phishing Email Analyzer. Enabling non-techies to analyze phishing emails automatically!☆63Updated 2 years ago
- If you a security engineer or an aspirant Security professional then Setting up a Wazuh home lab environment is an excellent way for SOC …☆16Updated last year
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆146Updated last year
- ☆35Updated last year
- Includes quick start guides for Shodan for both IT and ICS/OT assets☆136Updated 2 years ago
- Comprehensive adversary emulation tool for security testing on Google Cloud Platform (GCP) environments.☆14Updated last year
- A meta-list of public references to threat actor profiles and APT group datasets.☆73Updated 3 months ago
- Creation of a laboratory for malware analysis in AWS☆104Updated 3 years ago
- A curated list of tools useful within the field of cyber security, for both blue and red team operations.☆101Updated last year
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆69Updated 2 years ago
- Packet captures of malicious traffic for analysis using Wireshark☆64Updated 2 years ago
- ☆60Updated 7 months ago
- A collection of Malware Analysis software, materials, libraries, documents, books, resources about malware analysis in Cybersecurity.☆56Updated 2 years ago
- A short graduate course on cybercrime, cyberespionage, and cyberoperations☆83Updated last month
- Tor onion address lookup☆58Updated 2 weeks ago
- This is the repository for indicators of compromise (IOCs) and other data for threat intelligence articles posted on the Palo Alto Networ…☆111Updated 2 months ago
- This repo contains scripts to install a SIEM (Elasticsearch, Kibana and Filebeat) , HIDS (Wazuh Manager) and NIDS (Suricata)☆38Updated 11 months ago
- Splunk add-on related to the PurpleLab tool☆41Updated last year
- Suricata rules that can detect a wide range of threats, including malware, exploits, and other malicious activity especially web applicat…☆59Updated last year
- Strumenti di Acquisizione e Analisi di copie Forensi☆170Updated 4 months ago
- A curated list of tools and resources that I use daily as a Purple-Team operator.☆92Updated 7 months ago
- ThreatTracer - A python Script to identify CVE by name & version and more by @FR13ND0x7F☆137Updated 7 months ago
- ☆59Updated 2 months ago
- A SOC Analyst's tool to automate the investigation & validation of possible Indicators of Compromise (IOCs) and perform various tasks inc…☆29Updated 3 years ago
- ☆141Updated 7 months ago
- Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Group☆86Updated last year
- List of some cybersecurity conferences☆58Updated 4 months ago
- SOAR Automation with Shuffle, Wazuh & TheHive | This project integrates Shuffle SOAR, Wazuh SIEM, and TheHive to automate security incide…☆118Updated 10 months ago