StamusNetworks / SELKSLinks
A Suricata based IDS/IPS/NSM distro
☆1,554Updated 11 months ago
Alternatives and similar repositories for SELKS
Users that are interested in SELKS are comparing it to the libraries listed below
Sorting:
- Scirius is a web application for Suricata ruleset management and threat hunting.☆657Updated last month
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆2,164Updated this week
- Web Based Event Viewer (GUI) for Suricata EVE Events in Elastic Search☆461Updated this week
- Cortex: a Powerful Observable Analysis and Active Response Engine☆1,454Updated 2 weeks ago
- Your Everyday Threat Intelligence☆1,888Updated this week
- Slips, a free software behavioral Python intrusion prevention system (IDS/IPS) that uses machine learning to detect malicious behaviors i…☆814Updated this week
- Home of the dionaea honeypot☆759Updated last year
- Wazuh - Ruleset☆463Updated 10 months ago
- Suricata, Snort and Zeek IDS rule and pcap testing system☆483Updated 2 weeks ago
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆419Updated last week
- Modern Honey Network☆2,462Updated 8 months ago
- Shuffle: A general purpose security automation platform. Our focus is on collaboration and resource sharing.☆2,008Updated this week
- A utility to safely generate malicious network traffic patterns and evaluate controls.☆1,317Updated last year
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,514Updated last year
- Security Onion 16.04 - Linux distro for threat hunting, enterprise security monitoring, and log management☆3,093Updated 4 years ago
- TheHive: a Scalable, Open Source and Free Security Incident Response Platform☆3,782Updated last week
- Suricata IDS/IPS log analytics using the Elastic Stack.☆239Updated 4 years ago
- Security Onion is a free and open platform for threat hunting, enterprise security monitoring, and log management. It includes our own in…☆3,828Updated this week
- The tool for updating your Suricata rules.☆277Updated 2 weeks ago
- Create actionable data from your Vulnerability Scans☆1,389Updated 2 years ago
- Wazuh - Docker containers☆870Updated this week
- A Suricata Docker image.☆291Updated last week
- Pulled Pork for Snort and Suricata rule management (from Google code)☆437Updated 4 years ago
- A network sniffer that logs all DNS server replies for use in a passive DNS setup☆1,709Updated last year
- Web app that provides basic navigation and annotation of ATT&CK matrices☆2,180Updated 2 weeks ago
- Advanced Honeypot framework.☆1,266Updated last year
- Modular and decentralised honeypot☆2,545Updated 2 months ago
- IntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol.☆1,070Updated 2 weeks ago
- Digging Deeper....☆3,364Updated this week
- Configuration files for the SOF-ELK VM☆1,616Updated this week