Cisco-Talos / snort-faq
Snort FAQ
☆116Updated 3 years ago
Alternatives and similar repositories for snort-faq:
Users that are interested in snort-faq are comparing it to the libraries listed below
- ☆169Updated 3 years ago
- a network packet capture compiler☆197Updated 2 years ago
- ☆36Updated 4 years ago
- The OTX Suricata Rule Generator can be used to create the rules and configuration for Suricata to alert on indicators from your OTX accou…☆108Updated 9 months ago
- Bro scripts to be shared with the community☆109Updated 11 years ago
- Extract files from network traffic with Zeek.☆100Updated 4 years ago
- Suricata Extreme Performance Tuning guide☆207Updated 6 years ago
- MozDef: The Mozilla Defense Platform☆67Updated 4 years ago
- Alienvault OTX Bro IDS Connector☆73Updated 9 years ago
- Scripts for Bro IDS and ELK Stack☆56Updated 9 years ago
- Misc. Bro scripts☆63Updated 7 years ago
- ☆48Updated 4 years ago
- Passive Real-time Asset Detection System☆233Updated 8 months ago
- ☆201Updated last year
- Wireshark plugin to display Suricata analysis info☆93Updated 3 years ago
- SIFT Bootstrap Script☆146Updated 7 years ago
- Sandia Cyber Omni Tracker (SCOT)☆246Updated 3 months ago
- Repo for autosnort scripts.☆156Updated 4 years ago
- Tool for managing Zeek deployments.☆54Updated last month
- The default package source of the Zeek Package Manager. Wrote a package? See the README for how to get it included.☆133Updated last week
- Windows Live Artifacts Acquisition Script☆186Updated 2 years ago
- Simple Microsoft Windows sessions event logs visualization☆151Updated 2 years ago
- Dovehawk is a Zeek module that automatically imports MISP indicators and reports Sightings☆122Updated 3 years ago
- dionaea low interaction honeypot (forked from dionaea.carnivore.it)☆155Updated 9 years ago
- Convert 802.11 Packet Traces to XML and SQLITE Format☆66Updated 9 years ago
- Spam Honeypot with Intelligent Virtual Analyzer☆136Updated last month
- A powershell script for creating a Windows honeyport.☆87Updated 9 years ago
- AuditParser☆58Updated 11 years ago
- Graylog Processing Pipeline functions to enrich log messages with IoC information from threat intelligence databases☆153Updated 11 months ago
- Network Forensics Bro scripts & pcap samples☆62Updated 10 years ago