FrankHassanabad / suricata-sample-data
Repository of creating different example suricata data sets
☆34Updated 6 years ago
Alternatives and similar repositories for suricata-sample-data
Users that are interested in suricata-sample-data are comparing it to the libraries listed below
Sorting:
- A completely automated anomaly detector Zeek network flows files (conn.log).☆78Updated 9 months ago
- A Zeek script to generate features based on timing, volume and metadata for traffic classification.☆55Updated 4 years ago
- DGA Detection with ML and DL☆48Updated 5 years ago
- Mapping NSM rules to MITRE ATT&CK☆71Updated 4 years ago
- This work shows the viability of automatically generated attack graphs that are used for adversary behavior execution in industrial contr…☆12Updated 3 years ago
- Configuring the Suricata IDS to detect DoS attacks by adding custom rule file.☆39Updated 5 years ago
- Zeek scripts that provide an alternative log file logging TLS/SSL traffic☆10Updated 4 years ago
- This repository will hold PCAP IOC data related with known malware samples (owner: Bryant Smith)☆103Updated 3 years ago
- "Linking Threat Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations for Cyb…☆93Updated 10 months ago
- Pcap-splitter allows you to split a pcap file into subsets of pcap files based on sessions, flows, ip addresses, number of bytes, number …☆65Updated 5 years ago
- A python app to predict Att&ck tactics and techniques from cyber threat reports☆121Updated last year
- Open source endpoint agent providing host information to Zeek. [v2]☆80Updated this week
- Collection of Snort 2/3 rules.☆36Updated 6 years ago
- zeek-scripts☆44Updated 6 years ago
- STIX 2.1 Visualizer, Attack and Activity Thread Graph for Threat Modeling☆32Updated 5 months ago
- Using Python script instead of Nmap NSE script to detect ICS protocols[根据nmap nse脚本来编写工控协议识别的python脚本]☆32Updated 4 years ago
- Growing collection of Spicy-based protocol and file analyzers for Zeek☆31Updated 8 months ago
- This is an open source Snort rules repository☆30Updated 2 years ago
- A library and command line tool for extracting indicators of compromise (IOCs) from security reports in PDF, HTML, Word, or text format☆31Updated 3 weeks ago
- ☆108Updated 4 years ago
- Download pcap files from http://www.malware-traffic-analysis.net/☆76Updated 7 years ago
- nPrint provides a generalizable data representation for network packets that works directly with machine learning techniques☆112Updated 3 years ago
- Apache Metron☆59Updated 4 years ago
- OpenWRT Suricata package☆50Updated 7 years ago
- Convert pcap files into richly-typed ZNG summary logs (Zeek, Suricata, and more)☆81Updated 3 weeks ago
- Collection of various open-source an commercial rulesets for NIDS (especially for Suricata and Snort)☆26Updated last year
- Extracting Attack Behavior from Threat Reports☆76Updated 2 years ago
- A framework for the Analysis of Intrusion Detection Alerts☆17Updated 3 years ago
- User anomaly detector based on logs generated by Osquery framework and machine learning to process those logs.☆33Updated 7 years ago
- Pure python parser for Snort/Suricata rules.☆31Updated last year