Mapping NSM rules to MITRE ATT&CK
☆73Aug 29, 2020Updated 5 years ago
Alternatives and similar repositories for nsm-attack
Users that are interested in nsm-attack are comparing it to the libraries listed below
Sorting:
- A website and framework for testing NIDS detection☆57Aug 29, 2021Updated 4 years ago
- Suricata rules for the new critical vulnerabilities☆84Jan 26, 2021Updated 5 years ago
- Suricata rules for network anomaly detection☆183Feb 7, 2026Updated last month
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆39Aug 18, 2022Updated 3 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Sep 17, 2019Updated 6 years ago
- provides a Suricata Eve output for Kafka with Suricate Eve plugin☆15Nov 25, 2021Updated 4 years ago
- ☆14Jan 14, 2026Updated 2 months ago
- fast, extensible, versatile event router for Suricata's EVE-JSON format☆57Nov 20, 2025Updated 4 months ago
- Automation of VPC Traffic Mirror Sessions in AWS☆35Nov 15, 2025Updated 4 months ago
- A flexible, easy to use, automation framework allowing users to integrate their capabilities and devices to cut through the repetitive, t…☆12Nov 23, 2022Updated 3 years ago
- An Installation Script for Bro IDS on Debian Based Systems☆20Jun 25, 2020Updated 5 years ago
- Next major release of sniffMyPackets - Now with added packet loving☆12Mar 19, 2015Updated 11 years ago
- Suricata RPMs for CentOS/RHEL and Fedora☆19Updated this week
- Passive Bitcoin Project☆10Aug 10, 2015Updated 10 years ago
- ☆10Jun 2, 2020Updated 5 years ago
- ☆12Dec 23, 2021Updated 4 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Apr 18, 2020Updated 5 years ago
- A dsniff project using bro☆11Jan 25, 2016Updated 10 years ago
- Detection Engineering research, open-source tools, conference presentations, and technical publications shared with the security communit…☆28Dec 17, 2025Updated 3 months ago
- ☆12Jan 28, 2020Updated 6 years ago
- A fast library for parsing and importing Windows Event Logs into Elasticsearch.☆86Updated this week
- This is a repository from Adam Swan and I's presentation on Windows Logs Zero 2 Hero.☆22Jan 30, 2018Updated 8 years ago
- Utilizing your Threat data from a MISP instance into CarbonBlack Response by exposing the data in the Threat Intelligence Feed.☆20May 25, 2022Updated 3 years ago
- S2AN - Mapper of Sigma/Suricata Rules/Signatures ➡️ MITRE ATT&CK Navigator☆91Dec 8, 2022Updated 3 years ago
- ☆168Jan 20, 2021Updated 5 years ago
- Zeek plugin to generate data on per-packet sizes and intervals☆14Apr 21, 2020Updated 5 years ago
- A collection of Cortex Analyzers and Responders for TheHive/Cortex☆13Jan 29, 2020Updated 6 years ago
- Python tool for converting from joy format to JA3 format SSL/TLS hashes☆11Jun 3, 2020Updated 5 years ago
- ☆13Oct 7, 2019Updated 6 years ago
- Zeek package to generate a SMB client fingerprint☆27May 5, 2020Updated 5 years ago
- add dpdk interface and packet processing to suricata in worker mode☆64Aug 7, 2020Updated 5 years ago
- Collection of Suricata rule sets that I use modified to my environments.☆39Sep 13, 2020Updated 5 years ago
- This repository has been archived in favor of https://github.com/idaholab/Malcolm-Test-Artifacts☆38Dec 11, 2024Updated last year
- Dockerized Zeek☆12Mar 9, 2024Updated 2 years ago
- 天御攻防实验室 - 威胁猎杀实战系列☆102Jul 4, 2019Updated 6 years ago
- FSL Test bench - Ansible playbook repository to setup a save environment for security auditing and testing. It can be used for teaching s…☆30Nov 26, 2024Updated last year
- Automatic detection engineering technical state compliance☆55Jul 7, 2024Updated last year
- Various snippets created during malware analysis☆22Apr 29, 2018Updated 7 years ago
- Re-play Security Events☆1,728Mar 20, 2024Updated 2 years ago