Kibana 7 Templates for Suricata IDPS Threat Hunting
☆44Apr 26, 2026Updated last week
Alternatives and similar repositories for KTS7
Users that are interested in KTS7 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆20Jul 4, 2020Updated 5 years ago
- Space is a modern, and clean web proxy with many games, apps and features Ad free deployment, chat room added to Space, 1.1.3 modded ver…☆21Dec 23, 2025Updated 4 months ago
- Mass Suricata rules creator, from a list of domain☆14Sep 14, 2018Updated 7 years ago
- An Ansible playbook for deploying the Suricata intrusion detection system and fetching Snort rules with Oinkmaster.☆17Oct 30, 2021Updated 4 years ago
- Trying to get Unifi Dream Machine Pro syslogs sent to Wazuh Manager node processed, i came up with these decoder and rule sets.☆16May 7, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A Yara Lua output script for Suricata☆20Apr 7, 2019Updated 7 years ago
- Set of scripts to index PCAP files and retrieve packets☆14Sep 10, 2015Updated 10 years ago
- Quickly generate suricata rules for IOCs☆28Apr 30, 2021Updated 5 years ago
- Kibana 6 Templates for Suricata IDPS Threat Hunting☆24Mar 5, 2019Updated 7 years ago
- Suricata rules for network anomaly detection☆182Apr 14, 2026Updated 3 weeks ago
- A set of zeek scripts providing a module for tracking and correlating abnormal DNS behavior.☆35Jan 4, 2025Updated last year
- LiteSpeed Cache Privilege Escalation PoC☆23Aug 25, 2024Updated last year
- A Suricata based NDR distribution☆1,591Sep 13, 2025Updated 7 months ago
- IPS Suricata2MikroTik -CE- is a module for Suricata to read eve.json file and search specifics alert to block the source. This connect to…☆33Feb 3, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Exploit for CVE-2024-4883☆11Jul 8, 2024Updated last year
- Add POST body excerpt to Bro's HTTP log☆14Dec 10, 2025Updated 4 months ago
- The OTX Suricata Rule Generator can be used to create the rules and configuration for Suricata to alert on indicators from your OTX accou…☆118Apr 26, 2024Updated 2 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆13Apr 18, 2020Updated 6 years ago
- Ties pfSense with Suricata into ELK using docker-compose☆28Jul 4, 2018Updated 7 years ago
- A repository with data about APTs☆13Nov 24, 2022Updated 3 years ago
- Utilities and scripts for bro-ids☆23Jan 6, 2014Updated 12 years ago
- Snort/Suricata DAQ module with DPDK patch☆11Apr 10, 2024Updated 2 years ago
- Extreme Networks EXOS Driver implementation for the NAPALM Network Automation Project☆12Jun 28, 2021Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- add dpdk interface and packet processing to suricata in worker mode☆64Aug 7, 2020Updated 5 years ago
- ☆12Jan 28, 2020Updated 6 years ago
- gonids is a library to parse IDS rules, with a focus primarily on Suricata rule compatibility. There is a discussion forum available that…☆193Jul 18, 2025Updated 9 months ago
- Curated list of Moroccans publishing in the most prestigious AI conferences☆11Oct 14, 2024Updated last year
- A collection of scripts to look various things up in VERIS data such as VCDB.☆14Apr 27, 2017Updated 9 years ago
- ☆10Aug 27, 2022Updated 3 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆11Jun 21, 2018Updated 7 years ago
- Example Suricata rules implementing some of my detection tactics☆22Jan 13, 2023Updated 3 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆37Jan 13, 2023Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Web Based Event Viewer (GUI) for Suricata EVE Events in Elastic Search☆490Apr 25, 2026Updated last week
- Windows Internals Book 7th edition Tools☆17Apr 26, 2020Updated 6 years ago
- Advancing TTP Analysis: Harnessing the Power of Large Language Models with Retrieval Augmented Generation☆11May 14, 2024Updated last year
- Repository for prebuilt Extreme Management Center (Netsight/XMC) FlexView and OneView reports☆15Apr 23, 2026Updated last week
- LLM query engine to retrieve augmented responses from json files.☆15Oct 12, 2023Updated 2 years ago
- Scripts and outputs for ATLAS data in STIX JSON and ATT&CK Navigator layer formats☆31Updated this week
- Suricata Language Server is an implementation of the Language Server Protocol for Suricata signatures. It adds syntax check, hints and au…☆86Apr 13, 2026Updated 3 weeks ago