John-Lin / docker-snort
Snort in Docker for Network Functions Virtualization (NFV)
☆108Updated 6 years ago
Alternatives and similar repositories for docker-snort:
Users that are interested in docker-snort are comparing it to the libraries listed below
- Bro IDS Dockerfile☆129Updated 5 years ago
- Web service for scanning pcaps with snort☆109Updated 6 years ago
- Zeek IDS Dockerfile☆101Updated 2 years ago
- Alienvault ossim☆122Updated 2 months ago
- a network packet capture compiler☆199Updated 3 years ago
- Ready to run scripts for network analysis☆88Updated last month
- Rule sets for Sagan☆103Updated 4 years ago
- Honeynet Project generic authenticated datafeed protocol☆214Updated last year
- Passive Real-time Asset Detection System☆237Updated 11 months ago
- Core elements of the Modern Honey Network implemented in Docker☆34Updated 3 years ago
- Extract files from network traffic with Zeek.☆101Updated 5 years ago
- Passive DNS collection using Zeek☆182Updated last year
- Docker files for building Zeek.☆86Updated last year
- Vulnerability Data in ES☆146Updated 7 years ago
- Suricata Extreme Performance Tuning guide☆208Updated 7 years ago
- The stratosphere testing framework is mean to help in the researching and verification of the behavioral models used by the Stratoshpere …☆50Updated 7 years ago
- Detect cryptocurrency mining traffic with Zeek.☆46Updated 4 years ago
- idstools: Snort and Suricata Rule and Event Utilities in Python (Including a Rule Update Tool)☆281Updated last year
- ** README ** This repo has MOVED to https://github.com/quadrantsec/sagan☆228Updated 4 years ago
- Suricata Extreme Performance Tuning guide - Mark II☆117Updated 7 years ago
- Wireshark plugin to display Suricata analysis info☆94Updated 3 years ago
- Mapping NSM rules to MITRE ATT&CK☆71Updated 4 years ago
- Dockerfiles for NSM tools☆84Updated 8 years ago
- Evading Snort Intrusion Detection System.☆77Updated 3 years ago
- Apache Metron☆59Updated 4 years ago
- Bro scripts to be shared with the community☆109Updated 12 years ago
- A set of ICS IDS rules for use with Suricata.☆50Updated last year
- Bro IDS + ELK Stack to detect and block data exfiltration☆46Updated 6 years ago
- Tool for managing Zeek deployments.☆56Updated last week
- NTP logger/honeypot☆53Updated 11 years ago