Kibana 6 Templates for Suricata IDPS Threat Hunting
☆24Mar 5, 2019Updated 7 years ago
Alternatives and similar repositories for KTS6
Users that are interested in KTS6 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Kibana 5 Templates for Suricata IDPS☆43May 30, 2018Updated 7 years ago
- Mass Suricata rules creator, from a list of domain☆14Sep 14, 2018Updated 7 years ago
- Community-based CybergON-powered Suricata rules☆12Jul 5, 2022Updated 3 years ago
- ☆12Apr 26, 2018Updated 7 years ago
- A Yara Lua output script for Suricata☆20Apr 7, 2019Updated 6 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- 威胁检测规则集☆15Jul 5, 2019Updated 6 years ago
- Web Based Event Viewer (GUI) for Suricata EVE Events in Elastic Search☆485Updated this week
- ☆35Dec 9, 2023Updated 2 years ago
- CLI tool for testing Office documents with macros using MaliciousMacroBot☆12Dec 3, 2023Updated 2 years ago
- ☆11Nov 26, 2025Updated 3 months ago
- Minimalistic WebUI for passiveDNS tool☆18May 6, 2021Updated 4 years ago
- A set of zeek scripts providing a module for tracking and correlating abnormal DNS behavior.☆35Jan 4, 2025Updated last year
- nfsinkhole is a Python library and scripts for setting up a Linux server as a sinkhole (monitor, log/capture, and drop all traffic to a s…☆12Apr 8, 2017Updated 8 years ago
- My logstash plugins. Filter: sig (for security detect -> IOC, sig, New value, Reference, link, frequence, ...). Output: alert created by …☆10Jul 26, 2019Updated 6 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Sep 17, 2019Updated 6 years ago
- Structure aware fuzzing for network traffic packet captures☆13Nov 18, 2025Updated 4 months ago
- Bro IDS + ELK Stack to detect and block data exfiltration☆46Oct 31, 2018Updated 7 years ago
- Graphical analysis of PDF structure.☆13Jan 9, 2017Updated 9 years ago
- Network timing evaluation used to detect beacons, works with argus flow as the source☆20May 4, 2016Updated 9 years ago
- Materials for the BSides NoVA/Charleston 2018 Bro Workshop☆14Jun 4, 2025Updated 9 months ago
- ☆11Jul 19, 2021Updated 4 years ago
- ☆38Nov 2, 2024Updated last year
- ☆15Mar 17, 2026Updated last week
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆12Jan 28, 2020Updated 6 years ago
- pcapdj - dispatch pcap files☆46Jul 28, 2020Updated 5 years ago
- A very simple way to try Suricata and EveBox☆15Feb 17, 2025Updated last year
- ☆17Mar 13, 2026Updated last week
- Argus is a system and network monitoring application☆14Jan 16, 2020Updated 6 years ago
- Example configuration files for Logstash☆44Oct 30, 2019Updated 6 years ago
- A network packet synthesis language☆23Mar 18, 2026Updated last week
- Example Suricata rules implementing some of my detection tactics☆22Jan 13, 2023Updated 3 years ago
- Hakabana monitoring tool using Haka, ElastcSearch and Kibana☆20Sep 24, 2014Updated 11 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Suricata Extreme Performance Tuning guide☆213Mar 15, 2018Updated 8 years ago
- ☆12Apr 23, 2020Updated 5 years ago
- collection of bro and bash scripts that when run from the same directory on Linux distro with bro installed, will pull information such a…☆12Mar 29, 2016Updated 9 years ago
- Repo for Automations and other solutions for Elastic SIEM/Security.☆18Jun 15, 2021Updated 4 years ago
- traffic profiles repository contributions☆17Apr 3, 2017Updated 8 years ago
- Generate network maps from packet captures☆30Sep 15, 2019Updated 6 years ago
- AMICO - Accurate Behavior-Based Detection of Malware Downloads☆31Nov 13, 2017Updated 8 years ago