OISF / suricataLinks
Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine developed by the OISF and the Suricata community.
☆5,677Updated this week
Alternatives and similar repositories for suricata
Users that are interested in suricata are comparing it to the libraries listed below
Sorting:
- Snort++☆3,102Updated last week
- Zeek is a powerful network analysis framework that is much different from the typical IDS you may know.☆7,184Updated this week
- OSSEC is an Open Source Host-based Intrusion Detection System that performs log analysis, file integrity checking, policy monitoring, roo…☆4,850Updated 8 months ago
- A Suricata based NDR distribution☆1,570Updated last month
- Arkime is an open source, large scale, full packet capturing, indexing, and database system.☆7,139Updated this week
- This repository contains the scanner component for Greenbone Community Edition.☆4,098Updated this week
- The pattern matching swiss knife☆9,143Updated last month
- Cuckoo Sandbox is an automated dynamic malware analysis system☆5,822Updated 3 years ago
- MISP (core software) - Open Source Threat Intelligence and Sharing Platform☆5,965Updated this week
- Security Onion is a free and open platform for threat hunting, enterprise security monitoring, and log management. It includes our own in…☆4,094Updated this week
- TheHive: a Scalable, Open Source and Free Security Incident Response Platform☆3,832Updated 2 months ago
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆2,247Updated last week
- Malicious traffic detection system☆7,554Updated this week
- NIST Certified SCAP 1.2 toolkit☆1,582Updated last week
- Security Onion 16.04 - Linux distro for threat hunting, enterprise security monitoring, and log management☆3,105Updated 4 years ago
- A network sniffer that logs all DNS server replies for use in a passive DNS setup☆1,726Updated last year
- Repository of yara rules☆4,552Updated last year
- The Sleuth Kit® (TSK) is a library and collection of command line digital forensics tools that allow you to investigate volume and file s…☆2,900Updated last week
- Modern Honey Network☆2,467Updated 10 months ago
- A package for capturing and analyzing network flow data and intraflow data, for network research, forensics, and security monitoring.☆1,346Updated last year
- Open Source Tripwire®☆910Updated last year
- Advanced Honeypot framework.☆1,278Updated 2 years ago
- Network recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run yo…☆3,820Updated last week
- Zui is a powerful desktop application for exploring and working with data. The official front-end to the Zed lake.☆1,895Updated 3 weeks ago
- Slips, a free software behavioral Python intrusion prevention system (IDS/IPS) that uses machine learning to detect malicious behaviors i…☆835Updated this week
- Digging Deeper....☆3,501Updated this week
- cve-search - a tool to perform local searches for known vulnerabilities☆2,531Updated 3 weeks ago
- Pcap editing and replay tools for *NIX and Windows - Users please download source from☆1,276Updated last month
- Modular and decentralised honeypot☆2,610Updated 5 months ago
- Attack Detection☆1,362Updated 3 years ago