Docker based Suricata, Elasticsearch, Logstash, Kibana, Scirius aka SELKS
☆184Sep 13, 2022Updated 3 years ago
Alternatives and similar repositories for Amsterdam
Users that are interested in Amsterdam are comparing it to the libraries listed below
Sorting:
- Scirius is a web application for Suricata ruleset management and threat hunting.☆673Dec 23, 2025Updated 2 months ago
- A scalable framework for binary analysis in a containered environment.☆13May 20, 2019Updated 6 years ago
- Cyber Defence Monitoring Course Suite :: Suricata, Bro, Moloch☆61Feb 20, 2017Updated 9 years ago
- Web Based Event Viewer (GUI) for Suricata EVE Events in Elastic Search☆484Feb 19, 2026Updated 2 weeks ago
- ☆21Aug 25, 2015Updated 10 years ago
- Docker container for MISP☆96Jun 20, 2018Updated 7 years ago
- Dockerfiles for NSM tools☆84Apr 14, 2017Updated 8 years ago
- [ABANDONED] A Docker container running Suricata and the ELK stack.☆21Jan 27, 2016Updated 10 years ago
- A Suricata based NDR distribution☆1,588Sep 13, 2025Updated 5 months ago
- Harbinger Threat Intelligence☆83Dec 8, 2015Updated 10 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆439Feb 24, 2023Updated 3 years ago
- Help summarize a PCAP file☆33Dec 27, 2011Updated 14 years ago
- Scripts for dealing with various ek's☆69Feb 2, 2017Updated 9 years ago
- ☆305May 28, 2017Updated 8 years ago
- vagrant multi-machine: Moloch, Bro,Suricata,ElasticSearch,Kibana☆41Nov 24, 2014Updated 11 years ago
- python SDK for CIFv2☆13Nov 5, 2019Updated 6 years ago
- Python script that gets IOC from MISP and converts it into BRO intel files.☆13Apr 17, 2016Updated 9 years ago
- Modified edition of cuckoo☆272Sep 9, 2019Updated 6 years ago
- Efficient clustering of MASSCAN results☆12Dec 26, 2016Updated 9 years ago
- Kibana 4 Templates for Suricata IDPS☆33Jul 28, 2016Updated 9 years ago
- Monitoring attacks with elastick, kibana, grok, logstash and beats☆20Mar 2, 2017Updated 9 years ago
- An environment for comprehensive, automated analysis of web-based exploits, based on Cuckoo sandbox.☆124Aug 10, 2015Updated 10 years ago
- Manage VT Alerts☆62Oct 4, 2016Updated 9 years ago
- Unpack MIME attachments from a file and check them against virustotal.com☆44Mar 11, 2016Updated 9 years ago
- Bro scripts written by CrowdStrike Services☆150May 3, 2021Updated 4 years ago
- Malformity is a Maltego project based on the Canari framework for malicious binary and infrastructure research.☆115May 4, 2016Updated 9 years ago
- Suricata, Snort and Zeek IDS rule and pcap testing system☆511Updated this week
- Black Hills Info Sec has a great tool on Byt3Bl33d3rs github utilizing Gmail as C2 tansport. Using that Idea I wanted something that did…☆12May 16, 2016Updated 9 years ago
- All Zero Nights 2016 'A threat hunter himself' stuff☆16Nov 18, 2016Updated 9 years ago
- Just another tool to extract Indicator of compromise (ioc) from files☆29Oct 1, 2015Updated 10 years ago
- Identify botnet panels with Ensembled Decision Trees☆18Aug 3, 2016Updated 9 years ago
- Script for generating Bro intel files from pdf or html reports☆77Dec 7, 2015Updated 10 years ago
- threat language parser☆59Apr 20, 2015Updated 10 years ago
- docker based telnet honeypot☆80Feb 19, 2018Updated 8 years ago
- Threat Feed Aggregation, Made Easy☆169Jul 13, 2020Updated 5 years ago
- library to decode/parse zeus-like configuration files☆30Mar 19, 2018Updated 7 years ago
- Anti-Honeypot Demo (obsolete)☆18Jul 24, 2017Updated 8 years ago
- Ansible playbook to install Malware Information Sharing Platform (MISP)☆17Feb 20, 2015Updated 11 years ago
- Protocol Analysis/Decoder Framework☆497Dec 19, 2022Updated 3 years ago