AlkenePan / awesome-broLinks
Useful resources for Zeek(https://zeek.org/) (Bro(http://bro.org/))
☆31Updated 5 years ago
Alternatives and similar repositories for awesome-bro
Users that are interested in awesome-bro are comparing it to the libraries listed below
Sorting:
- ☆39Updated last year
- ☆35Updated last year
- How to Zeek Sysmon Logs!☆102Updated 3 years ago
- 威胁检测规则集☆15Updated 6 years ago
- This repository will hold PCAP IOC data related with known malware samples (owner: Bryant Smith)☆107Updated 4 years ago
- Explore Indicators of Compromise Automatically☆97Updated 5 years ago
- collector/runner☆65Updated last month
- ☆58Updated last year
- Web service for scanning pcaps with snort☆110Updated 7 years ago
- An easy ATT&CK-based Sysmon hunting tool, showing in Blackhat USA 2019 Arsenal☆203Updated 3 years ago
- A Beat that monitors a local Nessus reports directory and outputs scan results to Elasticsearch or Logstash.☆31Updated 8 years ago
- Rule sets for Sagan☆105Updated 4 years ago
- Passive DNS collection using Zeek☆181Updated 2 years ago
- Templates for Kibana/Logstash to use with Suricata IDPS☆81Updated 9 years ago
- Suricata rules for the new critical vulnerabilities☆83Updated 4 years ago
- A set of zeek scripts providing a module for tracking and correlating abnormal DNS behavior.☆36Updated 9 months ago
- Bro integration with osquery☆15Updated 2 years ago
- Mapping NSM rules to MITRE ATT&CK☆72Updated 5 years ago
- OpenFlow Honeypot☆24Updated 12 years ago
- Quickly generate suricata rules for IOCs☆28Updated 4 years ago
- Real Time Threat Monitoring Tool☆112Updated 2 years ago
- PcapMonkey will provide an easy way to analyze pcap using the latest version of Suricata and Zeek.☆158Updated 7 months ago
- A repository for OSSEC rules and decoders☆53Updated 2 years ago
- Extract files from network traffic with Zeek.☆103Updated 5 years ago
- The OTX Suricata Rule Generator can be used to create the rules and configuration for Suricata to alert on indicators from your OTX accou…☆112Updated last year
- Yara powered NIDS with high speed packet capture powered by PF_RING☆69Updated last year
- A HIDS (host-based intrusion detection system) for verifying the integrity of a system.☆59Updated last week
- DockerFiles for Docker Containers☆16Updated 8 years ago
- Malware Sinkhole List in various formats☆102Updated 3 years ago
- Snort rules☆35Updated 6 years ago