NLADC / dissectorLinks
Software responsible for extracting DDoS Fingerprints from traffic captures.
☆69Updated this week
Alternatives and similar repositories for dissector
Users that are interested in dissector are comparing it to the libraries listed below
Sorting:
- packet captures of real-world ddos attacks☆163Updated last week
- Network Entity Reputation Database☆36Updated last month
- BGP ranking is a free software to calculate the security ranking of Internet Service Provider (ASN)☆73Updated last year
- Suricata Extreme Performance Tuning guide - Mark II☆117Updated 7 years ago
- SD-WAN security and insecurity☆171Updated 4 years ago
- DynamiteNSM is a free Network Security Monitor developed by Dynamite Analytics to enable network visibility and advanced cyber threat det…☆170Updated 2 years ago
- System for network traffic analysis and anomaly detection.☆91Updated this week
- NTP, DNS, SSDP, Chargen and generic UDP-based amplification DDoS honeypot☆58Updated 4 years ago
- ARTEMIS: Real-Time Detection and Automatic Mitigation for BGP Prefix Hijacking. This is the main ARTEMIS repository that composes artemis…☆314Updated last year
- PROJECT DELTA: SDN SECURITY EVALUATION FRAMEWORK☆87Updated 2 years ago
- ZMapv6: Internet Scanner with IPv6 capabilities☆111Updated 4 months ago
- ioc2rpz is a place where threat intelligence meets DNS.☆110Updated 5 months ago
- DDOS Detection and Mitigation Appliance☆67Updated 8 years ago
- fast, extensible, versatile event router for Suricata's EVE-JSON format☆54Updated 3 months ago
- Suricata Verification Tests - Testing Suricata Output☆111Updated this week
- Snort IDS/IPS log analytics using the Elastic Stack.☆86Updated 3 years ago
- Collection of various open-source an commercial rulesets for NIDS (especially for Suricata and Snort)☆27Updated last year
- Suricata rule and intel index☆31Updated last week
- Web PCAP storage and analytics☆184Updated 2 years ago
- Ready to run scripts for network analysis☆88Updated 3 months ago
- ☆66Updated 10 months ago
- GQUIC Protocol Analyzer for Zeek (Bro) Network Security Monitor☆78Updated last year
- Passive Real-time Asset Detection System☆243Updated last year
- Application and service identification rules for Suricata☆18Updated 2 years ago
- A HIDS (host-based intrusion detection system) for verifying the integrity of a system.☆59Updated 2 weeks ago
- Python software that reads zone files, extract NS records, and detect cyclic dependencies☆37Updated last year
- The OTX Suricata Rule Generator can be used to create the rules and configuration for Suricata to alert on indicators from your OTX accou…☆111Updated last year
- IP ASN History to find ASN announcing an IP and the closest prefix announcing it at a specific date☆94Updated last month
- DDoS mitigation using null routing☆47Updated 5 months ago
- JA3 TLS Fingerprint database☆79Updated 5 years ago