LeeBrotherston / snortLinks
Snort Rules
☆19Updated 9 years ago
Alternatives and similar repositories for snort
Users that are interested in snort are comparing it to the libraries listed below
Sorting:
- Metadata Inspection Database Alerting System☆42Updated 11 years ago
- Aggregates security threats from a number of online sources, and outputs to Syslog CEF, Snort Signatures, Iptables rules, hosts.deny, etc…☆81Updated 9 years ago
- Basic Maltego Transforms for looking up SSL certs and IP info from censys.io☆41Updated 8 years ago
- Threat Intelligence distribution☆30Updated 9 years ago
- Cuckoo Sandbox Local Maltego Transforms Project☆49Updated 11 years ago
- CRITs IOC Visualization in Maltego☆28Updated 10 years ago
- Malformity is a Maltego project based on the Canari framework for malicious binary and infrastructure research.☆115Updated 9 years ago
- (Unofficial) Python API for https://malwr.com/☆62Updated 8 years ago
- A warehouse for your malware☆134Updated 12 years ago
- Threatbutt python client and Maltego transforms☆51Updated last year
- ☆46Updated 8 years ago
- Based on the Volatility framework, this script will run various plugins as well as create a timeline, or use YARA/ClamAV/VirusTotal to fi…☆48Updated 8 years ago
- A set of Maltego transforms for VirusTotal Public API v2.0. This set has the added functionality of caching queries on a daily basis to s…☆81Updated 9 years ago
- Yara is awesome, but sometimes you need to manipulate the data streams you're scanning in different ways.☆97Updated 10 years ago
- integrating bro into yara☆33Updated 10 years ago
- Cli interface to threatcrowd.org☆19Updated 8 years ago
- Transforms for the AlienVault OTX service☆39Updated 8 years ago
- Harbinger Threat Intelligence☆82Updated 9 years ago
- AYY LMAO☆12Updated 9 years ago
- The Intelligent Honey Net Project attempts to create actionable information from honeypots☆62Updated 9 years ago
- Bringing DevOps to Forensics☆34Updated 10 years ago
- Automated memory forensics analysis☆33Updated 5 years ago
- Gather and compile open source threat intelligence feeds.☆40Updated 3 years ago
- NTP logger/honeypot☆53Updated 11 years ago
- A Network Inspection Tool☆81Updated 7 years ago
- Python tools for IOC (Indicator of Compromise) handling☆96Updated 3 years ago
- A set of templates for documenting threat intelligence☆75Updated 12 years ago
- OpenDNS Graph Miner☆45Updated 8 years ago
- Network Forensics Bro scripts & pcap samples☆62Updated 11 years ago
- Beholder is a shell script which installs and configures essentials to peer into your network activity.☆19Updated 8 years ago