CESNET / NERDLinks
Network Entity Reputation Database
☆36Updated last month
Alternatives and similar repositories for NERD
Users that are interested in NERD are comparing it to the libraries listed below
Sorting:
- IP ASN History to find ASN announcing an IP and the closest prefix announcing it at a specific date☆94Updated last month
- BGP ranking is a free software to calculate the security ranking of Internet Service Provider (ASN)☆73Updated last year
- fast, extensible, versatile event router for Suricata's EVE-JSON format☆54Updated 2 months ago
- D4 core software (server and sample sensor client)☆42Updated last year
- IMAP or SMTP honeypot written in Golang☆25Updated 3 years ago
- A Spicy protocol analyzer for WireGuard☆29Updated 4 years ago
- Sample programs to access the API☆85Updated 2 months ago
- A commercial grade threat intelligence feed thats validated and updated every half hour.☆19Updated 2 years ago
- Prototype system to monitor BGP routes and alert when anomalies are identified☆15Updated 6 years ago
- The Cyber Security Platform MeliCERTes is part of the European Strategy for Cyber Security. MeliCERTes is a network for establishing conf…☆31Updated 3 years ago
- ☆66Updated 10 months ago
- Let's be scanned. A low-interaction honeypot focused on network scanners and bots. It integrates very well with IVRE to build a self-host…☆125Updated 3 weeks ago
- CERTITUDE - A python package to classify malicious URLs☆20Updated 3 years ago
- The Attacker IP Prioritizer(AIP) dynamically generates resource-friendly IPv4 blocklists from Zeek network flows.☆31Updated 7 months ago
- Yet another way to find where to report an abuse☆32Updated 5 months ago
- A network security policy compiler. Netspoc is targeted at environments with a large number of firewalls and admins. Firewall rules are d…☆72Updated this week
- Utility for annotating Internet datasets with contextual metadata (e.g., origin AS, MaxMind GeoIP2, reverse DNS, and WHOIS)☆100Updated last month
- server for indexing and querying passive DNS observations☆46Updated 3 months ago
- CSIRT Tooling: Best Practices in Developing, Maintaining and Distributing Open Source Tools☆16Updated 3 years ago
- Hourly Checked and Updated Spamhaus IP Addresses lists☆47Updated last year
- Application and service identification rules for Suricata☆18Updated 2 years ago
- A low/zero interaction ssh authentication logging honeypot☆22Updated 11 months ago
- ioc2rpz is a place where threat intelligence meets DNS.☆110Updated 5 months ago
- BruteForceBlocker is a perl script, that works along with pf firewall. Its main purpose is to block SSH bruteforce attacks via firewall.☆20Updated 4 years ago
- Kibana 6 Templates for Suricata IDPS Threat Hunting☆24Updated 6 years ago
- SMTP honeypot written in Golang☆29Updated 8 years ago
- Quickly generate suricata rules for IOCs☆29Updated 4 years ago
- DynamiteNSM is a free Network Security Monitor developed by Dynamite Analytics to enable network visibility and advanced cyber threat det…☆170Updated 2 years ago
- CyCAT.org API back-end server including crawlers☆29Updated 2 years ago
- Zeek Extension to Collect Metadata for Profiling of Endpoints and Proxies☆34Updated last year