Zeek-Formatted Threat Intelligence Feeds
☆390Mar 18, 2026Updated this week
Alternatives and similar repositories for Zeek-Intelligence-Feeds
Users that are interested in Zeek-Intelligence-Feeds are comparing it to the libraries listed below
Sorting:
- Standard-Format Threat Intelligence Feeds☆127Updated this week
- A set of Zeek scripts to detect ATT&CK techniques.☆622Jun 26, 2024Updated last year
- 🚌 Threat Bus – A threat intelligence dissemination layer for open-source security tools.☆270Mar 17, 2023Updated 3 years ago
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆39Aug 18, 2022Updated 3 years ago
- Dovehawk is a Zeek module that automatically imports MISP indicators and reports Sightings☆122Jul 12, 2021Updated 4 years ago
- Log4j Exploit Detection Logic for Zeek☆19Nov 25, 2025Updated 3 months ago
- Zeek package to create JSON formatted logs to stream into data analysis systems.☆30Dec 3, 2025Updated 3 months ago
- Automatically created C2 Feeds☆667Updated this week
- Zeek support for Community ID flow hashing.☆36Jul 11, 2023Updated 2 years ago
- This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. Contains multiple…☆787Updated this week
- Actionable analytics designed to combat threats☆1,004May 25, 2022Updated 3 years ago
- Enables Zeek to communicate with Tenzir☆11Jul 20, 2023Updated 2 years ago
- Your Everyday Threat Intelligence☆1,959Updated this week
- Add POST body excerpt to Bro's HTTP log☆14Dec 10, 2025Updated 3 months ago
- Industrial Control Systems Network Protocol Parsers☆191Mar 10, 2026Updated last week
- Zeek plugin to generate data on per-packet sizes and intervals☆14Apr 21, 2020Updated 5 years ago
- Zeek network security monitor plugin that enables parsing of the Ethernet/IP and Common Industrial Protocol standards☆46May 30, 2024Updated last year
- Open source endpoint agent providing host information to Zeek. [v2]☆90Mar 2, 2026Updated 2 weeks ago
- Threat Intel IoCs + bits and pieces of dark matter. Published by Gen Threat Labs.☆437Mar 11, 2026Updated last week
- Incident Response Documentation made easy. Developed by Incident Responders for Incident Responders☆1,062Oct 5, 2023Updated 2 years ago
- Extract and aggregate threat intelligence.☆908Jan 31, 2024Updated 2 years ago
- Awesome list of keywords and artifacts for Threat Hunting sessions☆648Aug 4, 2025Updated 7 months ago
- Real-time, container-based file scanning at enterprise scale☆978Mar 6, 2026Updated 2 weeks ago
- Detect Tactics, Techniques & Combat Threats☆2,268Jan 21, 2026Updated 2 months ago
- Zeek network security monitor plugin that enables parsing of the Tabular Data Stream (TDS) protocol☆25May 30, 2024Updated last year
- Mapping Corelight or Zeek data to Elastic Common Schema fields☆33Updated this week
- GQUIC Protocol Analyzer for Zeek (Bro) Network Security Monitor☆80Sep 13, 2023Updated 2 years ago
- ReversingLabs YARA Rules☆900Nov 3, 2025Updated 4 months ago
- Threat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysi…☆1,303Jun 1, 2023Updated 2 years ago
- Zeek network security monitor plugin that enables parsing of the Profinet protocol☆31May 30, 2024Updated last year
- Watcher - Open Source AI-powered Cyber Threat Intelligence & Hunting Platform. Developed with Django & React JS.☆1,254Mar 5, 2026Updated 2 weeks ago
- Threat-Intelligence Feeds & Tools & Frameworks☆222Jun 7, 2024Updated last year
- A Splunk app mapped to MITRE ATT&CK to guide your threat hunts☆1,174Jul 26, 2023Updated 2 years ago
- Repository of YARA rules made by Trellix ATR Team☆627Mar 18, 2025Updated last year
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,501Jan 12, 2026Updated 2 months ago
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆2,355Feb 19, 2026Updated last month
- ☆44Jul 11, 2025Updated 8 months ago
- Re-play Security Events☆1,728Mar 20, 2024Updated 2 years ago
- Defanged Indicator of Compromise (IOC) Extractor.☆569Aug 28, 2024Updated last year