Cisco-Talos / snort2-dockerLinks
☆13Updated 3 years ago
Alternatives and similar repositories for snort2-docker
Users that are interested in snort2-docker are comparing it to the libraries listed below
Sorting:
- A commercial grade threat intelligence feed thats validated and updated every half hour.☆19Updated 2 years ago
- Last download from git://git.carnivore.it/honeytrap.git of Honytrap by Tillmann Werner☆43Updated 3 years ago
- Passive Network Audit Framework☆32Updated 7 years ago
- OwlH Master API Web User Interface☆12Updated last year
- Application and service identification rules for Suricata☆18Updated 2 years ago
- ☆11Updated 4 years ago
- ☆21Updated 2 years ago
- Generic Signature Format for SIEM Systems☆14Updated 3 years ago
- A Passive DNS backend and collector☆31Updated 2 years ago
- Public Github Pages for Cisco☆14Updated 6 years ago
- Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.☆24Updated 8 years ago
- CLI tools using Harpoon features☆21Updated last year
- This module installs and configures MISP (Malware Information Sharing Platform)☆13Updated this week
- THOR MITRE ATT&CK Framework Coverage☆24Updated 4 years ago
- Lootbox downloads open directories shared on Twitter.☆35Updated 4 years ago
- Open Standard Vulnerability & Compliance Scanner☆43Updated 9 years ago
- A defense tool - detect web shells in local directories via md5sum☆33Updated 5 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago
- Network Forensic Extendable Analysis Tool☆39Updated 3 years ago
- ☆20Updated 5 years ago
- ProcessBouncer is a simple but effective tool for blocking malware with a process-based approach. With a little fine-tuning this allows t…☆24Updated 4 years ago
- A Yara Lua output script for Suricata☆20Updated 6 years ago
- GUI Tool to generate threat intelligence information in various formats☆43Updated 7 years ago
- collector/runner☆65Updated 2 months ago
- Prototype system to monitor BGP routes and alert when anomalies are identified☆15Updated 6 years ago
- Web interface for monitoring and interacting with Netflow data stored in Silk repositories.☆13Updated 6 years ago
- Home to the ActorTrackr source code☆29Updated 7 years ago
- Best practices in threat intelligence☆47Updated 2 years ago
- Suricata rule and intel index☆30Updated 2 months ago
- The Attacker IP Prioritizer(AIP) dynamically generates resource-friendly IPv4 blocklists from Zeek network flows.☆30Updated 6 months ago