Graylog2 / graylog-guide-snortLinks
How to send structured Snort IDS alert logs into Graylog
☆27Updated last year
Alternatives and similar repositories for graylog-guide-snort
Users that are interested in graylog-guide-snort are comparing it to the libraries listed below
Sorting:
- brostash: Linux distribution based on Debian and focusing on network security events collection☆34Updated 5 years ago
- Snort rules to detect local malware, phishing, and adult content by inspecting DNS responses from OpenDNS☆52Updated 9 years ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆72Updated 6 years ago
- Scripts for Bro IDS and ELK Stack☆57Updated 10 years ago
- How to Zeek Sysmon Logs!☆102Updated 3 years ago
- Bro IDS + ELK Stack to detect and block data exfiltration☆46Updated 6 years ago
- Top DNS Measurement for Bro☆11Updated 5 years ago
- ☆20Updated 5 years ago
- An Ubuntu 16.04 build containing Suricata, PulledPork, Bro, and Splunk☆23Updated 7 years ago
- Add POST body excerpt to Bro's HTTP log☆14Updated last year
- Detect HTTP stalling attacks like slowloris with Bro☆19Updated 7 years ago
- Security Onion Elastic Stack☆46Updated 4 years ago
- Integrate Zeek with Alienvault OTX☆25Updated 5 years ago
- A RESTful API frontend for Stenographer☆54Updated 2 years ago
- Kibana 6 Templates for Suricata IDPS Threat Hunting☆24Updated 6 years ago
- ☆23Updated 6 years ago
- Cyber Analytics Platform and Examination System (CAPES) Project Page☆60Updated 6 years ago
- scan-detection policies for bro☆16Updated 8 months ago
- A Docker container for Moloch based on minimal Debian☆26Updated 9 years ago
- BRO/Zeek IDS content pack contains pipeline rules, a stream, a dashboard displaying interesting activity, and a syslog tcp input to captu…☆19Updated 5 years ago
- Graylog Processing Pipeline functions to enrich log messages with IoC information from threat intelligence databases☆155Updated last year
- Download a list of suspected malicious IPs and Domains. Create a QRadar Reference Set. Search Your Environment For Malicious IPs☆69Updated 4 years ago
- A lightweight tool to score network traffic and flag anomalies☆123Updated last year
- JoeSandbox-Bro is a simple bro script which extracts files from your internet connection and analyzes them automatically on Joe Sandbox☆45Updated 6 years ago
- Traceroute improved wrapper for CSIRT and CERT operators☆38Updated last year
- Web service for scanning pcaps with snort☆109Updated 7 years ago
- Templates for Kibana/Logstash to use with Suricata IDPS☆81Updated 9 years ago
- collector/runner☆65Updated last month
- Cyber Threat Intelligence Feeds☆69Updated last year
- The OTX Suricata Rule Generator can be used to create the rules and configuration for Suricata to alert on indicators from your OTX accou…☆111Updated last year