Center-Sun / suricata-kafka-outputView external linksLinks
provides a Suricata Eve output for Kafka with Suricate Eve plugin
☆15Nov 25, 2021Updated 4 years ago
Alternatives and similar repositories for suricata-kafka-output
Users that are interested in suricata-kafka-output are comparing it to the libraries listed below
Sorting:
- Cyber threat intelligence crates for Rust☆16Jan 22, 2024Updated 2 years ago
- Full packet capture with flow cutoff, rotation, and compression☆15Sep 18, 2018Updated 7 years ago
- ☆14Aug 1, 2025Updated 6 months ago
- Go implementation of the Community ID flow hashing standard☆21Apr 17, 2025Updated 10 months ago
- Suricata JSON schema project☆12Jan 5, 2020Updated 6 years ago
- ☆10Jun 2, 2020Updated 5 years ago
- fast, extensible, versatile event router for Suricata's EVE-JSON format☆57Nov 20, 2025Updated 2 months ago
- Go Client for Suricata (Interacting via Socket)☆13Aug 23, 2020Updated 5 years ago
- ☆16Dec 15, 2025Updated 2 months ago
- Create dataset for suricata with indicators of MISP instances and add sightings in MISP if an indicator of dataset generates an alert☆36Nov 9, 2022Updated 3 years ago
- Repository to provide files related to our blog articles.☆16May 26, 2025Updated 8 months ago
- ☆38Nov 20, 2025Updated 2 months ago
- Private Search Set (PSS) is an extension to standard Bloom filter or a standalone hash file to describe and share private set.☆16Jan 10, 2025Updated last year
- suricata eve.json parser in Go☆15May 16, 2019Updated 6 years ago
- High resolution traffic measurement tool for Linux written in Go☆19Jul 28, 2019Updated 6 years ago
- This repository contains sample log data that were collected after running adversary simulations in Microsoft 365☆23Oct 9, 2024Updated last year
- A lens library so small in use you'd hardly notice it's there...☆25Mar 23, 2025Updated 10 months ago
- A Python implementation of the Community ID flow hashing standard☆24Nov 29, 2023Updated 2 years ago
- A tools to work on suricata stats.log file.☆29Oct 14, 2015Updated 10 years ago
- The Security Analyst’s Guide to Suricata☆61Apr 28, 2025Updated 9 months ago
- MISP-STIX-Converter - Python library to handle the conversion between MISP and STIX formats☆56Updated this week
- Top-K elephant flows finding using HeavyKeeper accurate algorithm☆31Jan 18, 2023Updated 3 years ago
- pocket guide for core threat hunting concepts☆23May 6, 2020Updated 5 years ago
- Validate if afpacket PACKET_FANOUT_HASH is working properly☆25May 19, 2022Updated 3 years ago
- YAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.☆27Dec 14, 2021Updated 4 years ago
- You're busted!☆27Dec 16, 2019Updated 6 years ago
- Fetches balances from Coinbase API and returns them as securities☆25Apr 18, 2022Updated 3 years ago
- A cyber threat intelligence server based on TAXII 2 and written in Golang☆32Sep 19, 2019Updated 6 years ago
- DHCP Fingerprinting☆31Dec 15, 2020Updated 5 years ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆71Apr 10, 2019Updated 6 years ago
- Suricata rule and intel index☆33Jan 13, 2026Updated last month
- The "Let's-defend-solution" directory contains the answers to all paths of the Let's Defend platform that were saved by the creator 8 mon…☆12Apr 27, 2023Updated 2 years ago
- Mapping NSM rules to MITRE ATT&CK☆73Aug 29, 2020Updated 5 years ago
- STIX 2.1 Visualizer, Attack and Activity Thread Graph for Threat Modeling☆33Dec 9, 2024Updated last year
- intelligence-icons is a collection of icons and diagrams for building training and marketing materials around Intelligence sharing; inclu…☆41Mar 17, 2019Updated 6 years ago
- Zeek scripts that provide an alternative log file logging TLS/SSL traffic☆12May 4, 2021Updated 4 years ago
- Debpic lets you easily build Debian packages in an isolated Docker environment.☆11Dec 6, 2024Updated last year
- server for indexing and querying passive DNS observations☆49Jan 12, 2026Updated last month
- Web interface to IntelMQ☆10Sep 10, 2025Updated 5 months ago