CESNET / Nemea-Detectors
Detection modules of the Nemea system.
☆21Updated 3 weeks ago
Alternatives and similar repositories for Nemea-Detectors:
Users that are interested in Nemea-Detectors are comparing it to the libraries listed below
- System for network traffic analysis and anomaly detection.☆89Updated 5 months ago
- Rule sets for Sagan☆103Updated 4 years ago
- Extract files from network traffic with Zeek.☆101Updated 5 years ago
- a network packet capture compiler☆199Updated 2 years ago
- Bro scripts to be shared with the community☆109Updated 12 years ago
- Suricata Extreme Performance Tuning guide☆208Updated 7 years ago
- The stratosphere testing framework is mean to help in the researching and verification of the behavioral models used by the Stratoshpere …☆50Updated 7 years ago
- Sweet, sweet, secrepo.com html.☆131Updated 3 years ago
- Mapping NSM rules to MITRE ATT&CK☆71Updated 4 years ago
- Web service for scanning pcaps with snort☆109Updated 6 years ago
- Passive Real-time Asset Detection System☆237Updated 10 months ago
- DGA Domains detection☆66Updated 7 years ago
- ☆75Updated 3 years ago
- Passive DNS collection using Zeek☆182Updated last year
- Passive DNS V2☆61Updated 11 years ago
- Various Bro scripts☆96Updated 8 years ago
- DNSDB query scripts☆75Updated 5 years ago
- Cyber Threat Intelligence Feeds☆95Updated 8 years ago
- Plugin providing native AF_Packet support for Zeek.☆34Updated last year
- A collection of known Domain Generation Algorithms☆66Updated 9 years ago
- Analysis scripts for the Bro Intrusion Detection System☆59Updated 11 years ago
- Scripts for Bro IDS and ELK Stack☆56Updated 9 years ago
- CIF v3 -- the fastest way to consume threat intelligence☆182Updated 2 years ago
- Wireshark plugin to display Suricata analysis info☆93Updated 3 years ago
- idstools: Snort and Suricata Rule and Event Utilities in Python (Including a Rule Update Tool)☆281Updated last year
- Evading Snort Intrusion Detection System.☆77Updated 3 years ago
- STIX Visualization Tool☆108Updated 6 years ago
- Contributed Bro Scripts☆30Updated 10 years ago
- ☆13Updated 2 months ago
- Data sets and examples for Jask Labs Blackhat 2017 Handout: Top 10 Machine Learning Cyber Security Use Cases☆31Updated 7 years ago