NLADC / dissectorLinks
Software responsible for extracting DDoS Fingerprints from traffic captures.
☆70Updated 4 months ago
Alternatives and similar repositories for dissector
Users that are interested in dissector are comparing it to the libraries listed below
Sorting:
- Suricata Extreme Performance Tuning guide - Mark II☆121Updated 7 years ago
- SD-WAN security and insecurity☆173Updated 5 years ago
- System for network traffic analysis and anomaly detection.☆92Updated 4 months ago
- DynamiteNSM is a free Network Security Monitor developed by Dynamite Analytics to enable network visibility and advanced cyber threat det…☆171Updated 2 years ago
- packet captures of real-world ddos attacks☆166Updated last month
- Network Entity Reputation Database☆37Updated 3 weeks ago
- A command-line utility program that performs some simple operations on PCAP files (Wireshark/tcpdump traces) very quickly. Allows you to …☆112Updated last week
- DDOS Detection and Mitigation Appliance☆68Updated 8 years ago
- BGP ranking is a free software to calculate the security ranking of Internet Service Provider (ASN)☆75Updated 2 months ago
- NTP, DNS, SSDP, Chargen and generic UDP-based amplification DDoS honeypot☆63Updated 4 years ago
- DDoS mitigation using null routing☆48Updated 10 months ago
- OpenWRT Suricata package☆54Updated 7 years ago
- ARTEMIS: Real-Time Detection and Automatic Mitigation for BGP Prefix Hijacking. This is the main ARTEMIS repository that composes artemis…☆319Updated 2 years ago
- Snort in Docker for Network Functions Virtualization (NFV)☆110Updated 6 years ago
- Web service for scanning pcaps with snort☆110Updated 7 years ago
- A HIDS (host-based intrusion detection system) for verifying the integrity of a system.☆60Updated last month
- aka GENESIDS: Reads and parses rules using a "snort like" syntax and generates and sends packets that trigger events in signature based I…☆22Updated 7 years ago
- Automatically enumerate and fingerprint SD-WAN nodes on the internet☆50Updated 4 years ago
- fast, extensible, versatile event router for Suricata's EVE-JSON format☆57Updated last week
- Ready to run scripts for network analysis☆88Updated 8 months ago
- BGP Route Leaks Detection☆71Updated 6 years ago
- The OTX Suricata Rule Generator can be used to create the rules and configuration for Suricata to alert on indicators from your OTX accou…☆112Updated last year
- Snort IDS/IPS log analytics using the Elastic Stack.☆87Updated 4 years ago
- IP ASN History to find ASN announcing an IP and the closest prefix announcing it at a specific date☆95Updated 2 months ago
- A flexible tool for analyzing network traffic and automation of the process of protection against DDoS attacks.☆141Updated 8 years ago
- Passive Real-time Asset Detection System☆248Updated last year
- BGP Hijack Detection☆115Updated 7 years ago
- Application and service identification rules for Suricata☆19Updated 3 years ago
- zeek-scripts☆45Updated 6 years ago
- ZMapv6: Internet Scanner with IPv6 capabilities☆116Updated last month