StamusNetworks / SELKSLinks
A Suricata based IDS/IPS/NSM distro
☆1,562Updated last month
Alternatives and similar repositories for SELKS
Users that are interested in SELKS are comparing it to the libraries listed below
Sorting:
- Scirius is a web application for Suricata ruleset management and threat hunting.☆661Updated this week
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆2,209Updated this week
- Web Based Event Viewer (GUI) for Suricata EVE Events in Elastic Search☆468Updated this week
- Security Onion 16.04 - Linux distro for threat hunting, enterprise security monitoring, and log management☆3,103Updated 4 years ago
- Cortex: a Powerful Observable Analysis and Active Response Engine☆1,473Updated last month
- Slips, a free software behavioral Python intrusion prevention system (IDS/IPS) that uses machine learning to detect malicious behaviors i…☆827Updated last week
- Wazuh - Ruleset☆476Updated 11 months ago
- Home of the dionaea honeypot☆768Updated last year
- A Suricata Docker image.☆295Updated last month
- Your Everyday Threat Intelligence☆1,901Updated 3 weeks ago
- A utility to safely generate malicious network traffic patterns and evaluate controls.☆1,322Updated last year
- Modern Honey Network☆2,461Updated 9 months ago
- Suricata, Snort and Zeek IDS rule and pcap testing system☆493Updated last month
- Attack Detection☆1,363Updated 3 years ago
- Shuffle: A general purpose security automation platform. Our focus is on collaboration and resource sharing.☆2,050Updated last week
- Security Onion is a free and open platform for threat hunting, enterprise security monitoring, and log management. It includes our own in…☆3,936Updated this week
- Wazuh - Docker containers☆902Updated last week
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆430Updated this week
- The tool for updating your Suricata rules.☆279Updated last month
- Suricata IDS/IPS log analytics using the Elastic Stack.☆239Updated 4 years ago
- Create actionable data from your Vulnerability Scans☆1,391Updated 2 years ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,515Updated last year
- TheHive: a Scalable, Open Source and Free Security Incident Response Platform☆3,813Updated last month
- Pulled Pork for Snort and Suricata rule management (from Google code)☆438Updated 4 years ago
- Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine developed by the OIS…☆5,558Updated last week
- Fast Incident Response☆1,928Updated last week
- Loki - Simple IOC and YARA Scanner☆3,640Updated this week
- Modular and decentralised honeypot☆2,583Updated 3 months ago
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆2,993Updated last week
- Digging Deeper....☆3,460Updated this week