SeisoLLC / zeek-kafka
A Zeek log writer plugin that publishes to Kafka.
☆46Updated 3 months ago
Alternatives and similar repositories for zeek-kafka:
Users that are interested in zeek-kafka are comparing it to the libraries listed below
- Plugin providing native AF_Packet support for Zeek.☆34Updated last year
- Apache Metron☆59Updated 4 years ago
- Mapping NSM rules to MITRE ATT&CK☆71Updated 4 years ago
- Open source endpoint agent providing host information to Zeek. [v2]☆80Updated 5 months ago
- Suricata Extreme Performance Tuning guide - Mark II☆116Updated 6 years ago
- Zeek Training Materials/Products☆37Updated last month
- a network packet capture compiler☆198Updated 2 years ago
- Suricata Verification Tests - Testing Suricata Output☆105Updated this week
- Zeek support for Community ID flow hashing.☆35Updated last year
- A set of zeek scripts providing a module for tracking and correlating abnormal DNS behavior.☆33Updated 3 months ago
- zeek-scripts☆44Updated 6 years ago
- Docker files for building Zeek.☆86Updated last year
- Suricata Language Server is an implementation of the Language Server Protocol for Suricata signatures. It adds syntax check, hints and au…☆70Updated this week
- Suricata Extreme Performance Tuning guide☆207Updated 7 years ago
- Zeek IDS Dockerfile☆101Updated 2 years ago
- The tool for updating your Suricata rules.☆268Updated this week
- Digital Bond's IDS/IPS rules for ICS and ICS protocols.☆143Updated 4 years ago
- Cyber Defence Monitoring Course Suite :: Suricata, Arkime (and others in the past)☆103Updated 10 months ago
- Open Source Security Information and event Management☆90Updated 9 years ago
- Log4j Exploit Detection Logic for Zeek☆19Updated 11 months ago
- OASIS TC Open Repository: TAXII 2 Server Library Written in Python☆128Updated 11 months ago
- This repository will hold PCAP IOC data related with known malware samples (owner: Bryant Smith)☆101Updated 3 years ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆77Updated 8 months ago
- Suricata, Snort and Zeek IDS rule and pcap testing system☆473Updated 3 months ago
- Suricata rules for network anomaly detection☆159Updated 3 weeks ago
- Suricata RPMs for CentOS/RHEL and Fedora☆19Updated this week
- The Security Analyst’s Guide to Suricata☆55Updated 10 months ago
- A set of ICS IDS rules for use with Suricata.☆49Updated last year
- DynamiteNSM is a free Network Security Monitor developed by Dynamite Analytics to enable network visibility and advanced cyber threat det…☆170Updated last year
- Mapping Corelight or Zeek data to Elastic Common Schema fields☆34Updated 2 months ago