StamusNetworks / sciriusLinks
Scirius is a web application for Suricata ruleset management and threat hunting.
☆668Updated 2 months ago
Alternatives and similar repositories for scirius
Users that are interested in scirius are comparing it to the libraries listed below
Sorting:
- Web Based Event Viewer (GUI) for Suricata EVE Events in Elastic Search☆473Updated this week
- Suricata IDS/IPS log analytics using the Elastic Stack.☆240Updated 4 years ago
- The tool for updating your Suricata rules.☆283Updated last month
- Suricata, Snort and Zeek IDS rule and pcap testing system☆505Updated this week
- idstools: Snort and Suricata Rule and Event Utilities in Python (Including a Rule Update Tool)☆283Updated 4 months ago
- A Suricata based NDR distribution☆1,583Updated 2 months ago
- Wazuh - Ruleset☆492Updated last year
- Super Next generation Advanced Reactive honEypot☆473Updated last year
- Security event correlation engine for ELK stack☆447Updated last year
- Pulled Pork for Snort and Suricata rule management (from Google code)☆442Updated 4 years ago
- Suricata Extreme Performance Tuning guide☆214Updated 7 years ago
- A Suricata Docker image.☆305Updated last week
- Passive Real-time Asset Detection System☆249Updated last year
- OpenSOC Apache Hadoop Code☆581Updated 5 years ago
- The Python SDK for AlienVault OTX☆392Updated last year
- Barnyard2 is a dedicated spooler for Snort's unified2 binary output format.☆354Updated last year
- Zeek Analysis Tools (ZAT): Processing and analysis of Zeek network data with Pandas, scikit-learn, Kafka and Spark☆450Updated last year
- Automated deployment scripts for the RockNSM network hunting distribution.☆456Updated 2 years ago
- DynamiteNSM is a free Network Security Monitor developed by Dynamite Analytics to enable network visibility and advanced cyber threat det…☆171Updated 2 years ago
- Create actionable data from your Vulnerability Scans☆1,396Updated 2 years ago
- Suricata Extreme Performance Tuning guide - Mark II☆121Updated 7 years ago
- a network packet capture compiler☆204Updated 3 years ago
- Web Application Honeypot☆591Updated last year
- A Linux Auditd rule set mapped to MITRE's Attack Framework☆815Updated 5 years ago
- Mapping the MITRE ATT&CK Matrix with Osquery☆803Updated 2 years ago
- IntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol.☆1,099Updated 3 weeks ago
- Suricata rules for network anomaly detection☆176Updated last week
- virtual honeypots☆388Updated 2 years ago
- Open Source Security Information and event Management☆104Updated 10 years ago
- Home of the dionaea honeypot☆782Updated last year