Kibana 6 Templates for Suricata IDPS Threat Hunting
☆24Mar 5, 2019Updated 7 years ago
Alternatives and similar repositories for KTS6
Users that are interested in KTS6 are comparing it to the libraries listed below
Sorting:
- Community-based CybergON-powered Suricata rules☆12Jul 5, 2022Updated 3 years ago
- Mass Suricata rules creator, from a list of domain☆14Sep 14, 2018Updated 7 years ago
- A Yara Lua output script for Suricata☆20Apr 7, 2019Updated 6 years ago
- A tools to work on suricata stats.log file.☆29Oct 14, 2015Updated 10 years ago
- Feed for verious malicious IPs such as malware and botnets☆12Jun 20, 2016Updated 9 years ago
- Wireshark plugin to display Suricata analysis info☆94Nov 5, 2021Updated 4 years ago
- ☆12Apr 23, 2020Updated 5 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Apr 18, 2020Updated 5 years ago
- ☆12Jan 28, 2020Updated 6 years ago
- Full Packet Capture for the Masses☆14Sep 13, 2018Updated 7 years ago
- Mikrotik's Winbox in a docker container accessible via noVNC through a web browser.☆13May 12, 2025Updated 9 months ago
- Materials for the BSides NoVA/Charleston 2018 Bro Workshop☆14Jun 4, 2025Updated 9 months ago
- Suricata rules to detect Winnti communication☆16Mar 5, 2018Updated 7 years ago
- Add POST body excerpt to Bro's HTTP log☆14Dec 10, 2025Updated 2 months ago
- 威胁检测规则集☆15Jul 5, 2019Updated 6 years ago
- ☆35Dec 9, 2023Updated 2 years ago
- An Ansible playbook for deploying the Suricata intrusion detection system and fetching Snort rules with Oinkmaster.☆17Oct 30, 2021Updated 4 years ago
- A set of zeek scripts providing a module for tracking and correlating abnormal DNS behavior.☆35Jan 4, 2025Updated last year
- Kibana 7 Templates for Suricata IDPS Threat Hunting☆43Dec 23, 2025Updated 2 months ago
- Collection of Suricata rule sets that I use modified to my environments.☆39Sep 13, 2020Updated 5 years ago
- Sniffpass will alert on cleartext passwords discovered in HTTP POST requests☆17Oct 30, 2023Updated 2 years ago
- Analysis of file (doc, pdf, exe, ...) in deep (emmbedded file(s)) with clamscan and yara rules☆51Sep 6, 2023Updated 2 years ago
- Suricata LUA scripts to detect CVE-2019-12255, CVE-2019-12256, CVE-2019-12258, and CVE-2019-12260☆19Nov 28, 2019Updated 6 years ago
- Zeek network security monitor plugin that enables parsing of the Ethernet/IP and Common Industrial Protocol standards☆46May 30, 2024Updated last year
- useful mikrotik functions☆21Oct 8, 2025Updated 4 months ago
- Advanced Persistent Threat Detection Using Network Analysis☆23Feb 28, 2019Updated 7 years ago
- Example Suricata rules implementing some of my detection tactics☆22Jan 13, 2023Updated 3 years ago
- Detect Phishing with Bro IDS☆18Feb 1, 2017Updated 9 years ago
- Dashboards and loader for ROCK NSM dashboards☆49Mar 13, 2023Updated 2 years ago
- Ansible modules for managing Mikrotik RouterOS-based devices☆52Oct 21, 2017Updated 8 years ago
- Bro IDS + ELK Stack to detect and block data exfiltration☆46Oct 31, 2018Updated 7 years ago
- Flexible framework that allows automation to process cyber threat information and update endpoint defense tools.☆20Oct 24, 2018Updated 7 years ago
- Automate sending mass commands to Mikrotik devices using SSH, SSL API and by REST API gateway.☆52Mar 7, 2023Updated 2 years ago
- A RESTful API frontend for Stenographer☆54Dec 7, 2022Updated 3 years ago
- fast, extensible, versatile event router for Suricata's EVE-JSON format☆57Nov 20, 2025Updated 3 months ago
- ☆24Mar 29, 2020Updated 5 years ago
- Scripts useful in cracking the Vulnhub Lab named View2aKill: 1☆26Feb 1, 2020Updated 6 years ago
- Web Based Event Viewer (GUI) for Suricata EVE Events in Elastic Search☆484Feb 19, 2026Updated last week
- Suricata Extreme Performance Tuning guide☆213Mar 15, 2018Updated 7 years ago