NLADC / dissectorLinks
Software responsible for extracting DDoS Fingerprints from traffic captures.
☆70Updated 6 months ago
Alternatives and similar repositories for dissector
Users that are interested in dissector are comparing it to the libraries listed below
Sorting:
- Suricata Extreme Performance Tuning guide - Mark II☆121Updated 7 years ago
- DDOS Detection and Mitigation Appliance☆68Updated 8 years ago
- SD-WAN security and insecurity☆173Updated 5 years ago
- DynamiteNSM is a free Network Security Monitor developed by Dynamite Analytics to enable network visibility and advanced cyber threat det…☆172Updated 2 years ago
- BGP ranking is a free software to calculate the security ranking of Internet Service Provider (ASN)☆77Updated last month
- ZMapv6: Internet Scanner with IPv6 capabilities☆118Updated 3 months ago
- PROJECT DELTA: SDN SECURITY EVALUATION FRAMEWORK☆89Updated 2 years ago
- SI6 Networks' IPv6 Toolkit☆278Updated last year
- packet captures of real-world ddos attacks☆167Updated 3 months ago
- A command-line utility program that performs some simple operations on PCAP files (Wireshark/tcpdump traces) very quickly. Allows you to …☆113Updated 2 months ago
- NTP, DNS, SSDP, Chargen and generic UDP-based amplification DDoS honeypot☆63Updated 5 years ago
- Snort in Docker for Network Functions Virtualization (NFV)☆109Updated 6 years ago
- Python IP address to Autonomous System Number lookup module. (Supports fast local lookups, and historical lookups using archived BGP dump…☆320Updated last year
- BGP Route Leaks Detection☆71Updated 7 years ago
- Network Entity Reputation Database☆37Updated 3 weeks ago
- System for network traffic analysis and anomaly detection.☆92Updated 6 months ago
- Passive Real-time Asset Detection System☆249Updated last year
- Automatically enumerate and fingerprint SD-WAN nodes on the internet☆49Updated 4 years ago
- Suricata rule and intel index☆33Updated 3 weeks ago
- OPNsense IDS/IPS rules☆79Updated 2 years ago
- DDoS mitigation using null routing☆47Updated last year
- Snort IDS/IPS log analytics using the Elastic Stack.☆87Updated 4 years ago
- calculate flow information from PCAP and extract tcp streams☆72Updated last year
- Kibana 6 Templates for Suricata IDPS Threat Hunting☆24Updated 6 years ago
- IP ASN History to find ASN announcing an IP and the closest prefix announcing it at a specific date☆96Updated last month
- BGP Hijack Detection☆117Updated 7 years ago
- The OTX Suricata Rule Generator can be used to create the rules and configuration for Suricata to alert on indicators from your OTX accou…☆113Updated last year
- ☆68Updated last year
- Application Layer IDS/IPS with iptables☆77Updated 7 years ago
- ARTEMIS: Real-Time Detection and Automatic Mitigation for BGP Prefix Hijacking. This is the main ARTEMIS repository that composes artemis…☆323Updated 2 years ago