DjGorillaz / anomaly-detection-and-monitoring
Anomaly detection and monitoring software
☆20Updated 6 years ago
Related projects: ⓘ
- A repository for OSSEC rules and decoders☆51Updated last year
- NMap XML decoding for logstash☆28Updated last year
- go-audit is an alternative to the auditd daemon that ships with many distros☆16Updated 5 years ago
- A Beat that monitors a local Nessus reports directory and outputs scan results to Elasticsearch or Logstash.☆31Updated 6 years ago
- VulnWhisperer Stack (ELK + VulnWhisperer + OpenVAS + Nessus)☆12Updated 6 years ago
- Plugin for Zeek/Bro which provides http2 decoder/analyzer☆30Updated 3 months ago
- ☆12Updated this week
- Golang based web service to scan files with yara rules☆26Updated 7 years ago
- Vulnerability consolidation and management tool, enhances scan results by merging different findings of the same weakness across multiple…☆23Updated last year
- alertflex controller☆10Updated 8 months ago
- ☆20Updated 4 years ago
- Network timing evaluation used to detect beacons, works with argus flow as the source☆18Updated 8 years ago
- Application and service identification rules for Suricata☆17Updated last year
- Download all packet captures from http://malware-traffic-analysis.net/☆19Updated 10 years ago
- Useful resources for Zeek(https://zeek.org/) (Bro(http://bro.org/))☆31Updated 4 years ago
- This is the C version of the StratosphereLinuxIPS. It is mainly used for integration with Snort and other IDSs.☆12Updated 7 years ago
- ☆25Updated this week
- JoeSandbox-Bro is a simple bro script which extracts files from your internet connection and analyzes them automatically on Joe Sandbox☆44Updated 5 years ago
- ☆15Updated 6 years ago
- A framework for automating penetration testing using a plugin based architecture☆34Updated 2 years ago
- Python framework for manipulating bulk WHOIS data from RIRs☆19Updated 2 years ago
- encoding format, library, and utilities for passive DNS data☆26Updated 5 months ago
- Quickly generate suricata rules for IOCs☆28Updated 3 years ago
- ☆22Updated 6 years ago
- Collect autorun records from running system☆59Updated 2 years ago
- create cypher create statements for neo4j out of netstat files from multiple machines☆41Updated 3 years ago
- A content inspecting SMTP proxy☆17Updated 10 years ago
- 👓 monitoring, alerting and threat analysis for ELK stack☆11Updated 7 years ago
- Tool for managing Zeek deployments.☆53Updated last month
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆72Updated 5 years ago