This repository is created to add value to existing Network Security Monitoring solutions.
☆17Sep 30, 2016Updated 9 years ago
Alternatives and similar repositories for NSM
Users that are interested in NSM are comparing it to the libraries listed below
Sorting:
- Indices for courses in SANS' Network Security Operations curriculum☆17Feb 5, 2016Updated 10 years ago
- ☆50Aug 30, 2020Updated 5 years ago
- This repository is created to add value to existing Network Security Monitoring solutions.☆42Sep 20, 2016Updated 9 years ago
- Mark Baggett's (@MarkBaggett - GSE #15, SANS SEC573 Author) tool for detecting randomness using NLP techniques rather than pure entropy c…☆131Oct 24, 2022Updated 3 years ago
- Convert Windows Netmon Monitor Mode Wireless Packet Captures to Libpcap Format☆15Jul 20, 2019Updated 6 years ago
- Bluewall is a firewall framework designed for offensive and defensive cyber professionals.☆106Apr 7, 2019Updated 6 years ago
- ArcSight's Common Event Format library☆39Nov 3, 2023Updated 2 years ago
- Visualisation of ulogd / ufw / iptables data☆39Dec 3, 2014Updated 11 years ago
- KillerZee: Tools for Attacking and Evaluating Z-Wave Networks☆56Jan 31, 2019Updated 7 years ago
- Use Neo4j to help visualize, explore and analyze GCP resources and IAM across your organization☆11Sep 1, 2020Updated 5 years ago
- A curated list of Docker resources☆28Nov 13, 2015Updated 10 years ago
- A completely unsupported set of scripts used in SANS FOR572, Advanced Network Forensics and Analysis☆28Aug 6, 2025Updated 7 months ago
- Stream Lookup function for GrayLog2 Pipeline Processor☆14Oct 1, 2021Updated 4 years ago
- Chrome app for Laverna☆15Feb 28, 2014Updated 12 years ago
- Potiron - Normalize, Index and Visualize Network Capture☆88Mar 1, 2019Updated 7 years ago
- ☆10Apr 10, 2019Updated 6 years ago
- ☆20Nov 6, 2023Updated 2 years ago
- Threat Feed Aggregation, Made Easy☆169Jul 13, 2020Updated 5 years ago
- Recursively validate a starting directory of file contents to identify changes, corrupt data☆37Jul 28, 2020Updated 5 years ago
- Fluentd plugin for Azure Event Hubs☆16Jul 2, 2021Updated 4 years ago
- Elasticsearch/Kibana environment and log data for Sigma workshop☆26Dec 20, 2019Updated 6 years ago
- An extension of the sigma standard to include security metrics.☆16May 18, 2023Updated 2 years ago
- Windows log and threat hunting with powershell☆16Dec 11, 2020Updated 5 years ago
- Cloud threat detection visualization from excalidraw☆12Apr 25, 2022Updated 3 years ago
- Provides detection capabilities and log conversion to evtx or syslog capabilities☆55Jul 1, 2022Updated 3 years ago
- Generic Signature Format for SIEM Systems☆18Jul 25, 2023Updated 2 years ago
- MITRE ATT&CK Based App in Power BI☆18Feb 23, 2024Updated 2 years ago
- Source code for the experimental, compact "wee" file compression utility.☆13May 8, 2020Updated 5 years ago
- Contains Logstash related content including tons of Logstash configurations☆254Aug 25, 2021Updated 4 years ago
- ☆17Aug 27, 2022Updated 3 years ago
- ☆23Dec 2, 2022Updated 3 years ago
- It's all about setting limits for yourself.☆15Jul 20, 2013Updated 12 years ago
- ☆226Nov 9, 2023Updated 2 years ago
- A collection of typical false positive indicators☆56Dec 5, 2020Updated 5 years ago
- ☆14Dec 5, 2014Updated 11 years ago
- Summit Route End Point Protection - Server code☆11Apr 10, 2016Updated 9 years ago
- Synapse Rapid Power-up for SinkDB☆11Jun 24, 2025Updated 8 months ago
- Still in dev mode☆12Apr 24, 2018Updated 7 years ago
- Network Security Monitoring Framework☆49Oct 19, 2012Updated 13 years ago