provides a Suricata Eve output for Kafka with Suricate Eve plugin
☆15Nov 25, 2021Updated 4 years ago
Alternatives and similar repositories for suricata-kafka-output
Users that are interested in suricata-kafka-output are comparing it to the libraries listed below
Sorting:
- Full packet capture with flow cutoff, rotation, and compression☆15Sep 18, 2018Updated 7 years ago
- Go implementation of the Community ID flow hashing standard☆21Apr 17, 2025Updated 10 months ago
- Suricata JSON schema project☆12Jan 5, 2020Updated 6 years ago
- fast, extensible, versatile event router for Suricata's EVE-JSON format☆57Nov 20, 2025Updated 3 months ago
- Go Client for Suricata (Interacting via Socket)☆13Aug 23, 2020Updated 5 years ago
- Create dataset for suricata with indicators of MISP instances and add sightings in MISP if an indicator of dataset generates an alert☆37Nov 9, 2022Updated 3 years ago
- Repository to provide files related to our blog articles.☆16May 26, 2025Updated 9 months ago
- ☆38Nov 20, 2025Updated 3 months ago
- Private Search Set (PSS) is an extension to standard Bloom filter or a standalone hash file to describe and share private set.☆16Jan 10, 2025Updated last year
- suricata eve.json parser in Go☆15May 16, 2019Updated 6 years ago
- High resolution traffic measurement tool for Linux written in Go☆19Jul 28, 2019Updated 6 years ago
- This repository contains sample log data that were collected after running adversary simulations in Microsoft 365☆24Oct 9, 2024Updated last year
- A Python implementation of the Community ID flow hashing standard☆23Nov 29, 2023Updated 2 years ago
- A lens library so small in use you'd hardly notice it's there...☆26Mar 23, 2025Updated 11 months ago
- The Security Analyst’s Guide to Suricata☆61Apr 28, 2025Updated 10 months ago
- MISP-STIX-Converter - Python library to handle the conversion between MISP and STIX formats☆56Updated this week
- YAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.☆27Dec 14, 2021Updated 4 years ago
- Top-K elephant flows finding using HeavyKeeper accurate algorithm☆31Jan 18, 2023Updated 3 years ago
- Validate if afpacket PACKET_FANOUT_HASH is working properly☆25May 19, 2022Updated 3 years ago
- pocket guide for core threat hunting concepts☆23May 6, 2020Updated 5 years ago
- You're busted!☆27Dec 16, 2019Updated 6 years ago
- DHCP Fingerprinting☆31Dec 15, 2020Updated 5 years ago
- A cyber threat intelligence server based on TAXII 2 and written in Golang☆32Sep 19, 2019Updated 6 years ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆71Apr 10, 2019Updated 6 years ago
- Suricata rule and intel index☆33Jan 13, 2026Updated last month
- Mapping NSM rules to MITRE ATT&CK☆73Aug 29, 2020Updated 5 years ago
- intelligence-icons is a collection of icons and diagrams for building training and marketing materials around Intelligence sharing; inclu…☆41Mar 17, 2019Updated 6 years ago
- STIX 2.1 Visualizer, Attack and Activity Thread Graph for Threat Modeling☆33Dec 9, 2024Updated last year
- Debpic lets you easily build Debian packages in an isolated Docker environment.☆11Dec 6, 2024Updated last year
- Zeek scripts that provide an alternative log file logging TLS/SSL traffic☆12May 4, 2021Updated 4 years ago
- server for indexing and querying passive DNS observations☆50Jan 12, 2026Updated last month
- ☆10Dec 1, 2021Updated 4 years ago
- ☆10Dec 5, 2017Updated 8 years ago
- Web interface to IntelMQ☆10Sep 10, 2025Updated 5 months ago
- Mapping Corelight or Zeek data to Elastic Common Schema logs☆12Dec 21, 2025Updated 2 months ago
- NTOP nDPI Library example usage and FFI bindings for Lua, NodeJS☆13Jan 29, 2018Updated 8 years ago
- A network file box☆14Mar 21, 2023Updated 2 years ago
- Repository resource threat intelligence for SOC☆10Sep 14, 2018Updated 7 years ago
- Scripts and ideas shared with the community.☆14Feb 27, 2026Updated last week