DCSO / slinkwatchLinks
automatic enumeration and maintenance of Suricata monitoring interfaces
☆11Updated 5 years ago
Alternatives and similar repositories for slinkwatch
Users that are interested in slinkwatch are comparing it to the libraries listed below
Sorting:
- Meer (GPLv2) is a dedicated "spooler" for the Suricata & Sagan EVE output formats.☆23Updated 4 years ago
- Prototype system to monitor BGP routes and alert when anomalies are identified☆15Updated 6 years ago
- Go implementation of the Community ID flow hashing standard☆20Updated 3 months ago
- Scripts to detect Fast-Flux and DGA using DNS query responses☆43Updated 8 years ago
- ☆20Updated 5 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated 9 months ago
- Zeek script library for getting the effective TLD of a domain.☆14Updated last year
- Check IOC provided by a MISP instance on Suricata events☆17Updated 6 years ago
- server for indexing and querying passive DNS observations☆46Updated this week
- A cyber threat intelligence server based on TAXII 2 and written in Golang☆30Updated 5 years ago
- ☆15Updated 7 years ago
- Suricata rule and intel index☆31Updated last week
- The FastIR Server is a Web server to schedule FastIR Collector forensics collect thanks to the FastIR Agent☆12Updated 8 years ago
- fast, extensible, versatile event router for Suricata's EVE-JSON format☆54Updated 3 months ago
- Application and service identification rules for Suricata☆18Updated 2 years ago
- The Auditd Framework logs and applies security policy to linux auditd data☆15Updated 7 years ago
- FastIR Agent is a Windows service to execute FastIR Collector on demand☆14Updated 8 years ago
- Getting Started with ELK☆50Updated 9 years ago
- Quickly generate suricata rules for IOCs☆29Updated 4 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago
- Low-interaction Postgres Honeypot☆19Updated last year
- Golang based web service to scan files with yara rules☆26Updated 8 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Updated 5 years ago
- Flame - Send vulnerabilities reports to SIEM☆15Updated 8 years ago
- Proof-of-concept for phishing intelligence in Elastic