StamusNetworks / suricata-4-analystsLinks
The Security Analyst’s Guide to Suricata
☆61Updated 7 months ago
Alternatives and similar repositories for suricata-4-analysts
Users that are interested in suricata-4-analysts are comparing it to the libraries listed below
Sorting:
- Suricata Language Server is an implementation of the Language Server Protocol for Suricata signatures. It adds syntax check, hints and au…☆84Updated last week
- ☆38Updated last month
- Create dataset for suricata with indicators of MISP instances and add sightings in MISP if an indicator of dataset generates an alert☆36Updated 3 years ago
- MISP-STIX-Converter - Python library to handle the conversion between MISP and STIX formats☆56Updated last week
- Threat Detection & Anomaly Detection rules for popular open-source components☆53Updated 3 years ago
- Cerebrate is an open-source platform meant to act as a trusted contact information provider and interconnection orchestrator for other se…☆91Updated last month
- A collection of tips for using MISP.☆75Updated last year
- SIEGMA - Transform Sigma rules into SIEM consumables☆157Updated 9 months ago
- This repository includes a mapping table and a reference process that allows converting between STIX 2.1 Course of Action objects that ma…☆16Updated 3 years ago
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆38Updated 3 years ago
- Open source endpoint agent providing host information to Zeek. [v2]☆90Updated 3 weeks ago
- ☆56Updated 3 years ago
- Suricata Verification Tests - Testing Suricata Output☆117Updated last week
- Suricata rules for network anomaly detection☆180Updated 3 weeks ago
- Import specific data sources into the Sigma generic and open signature format.☆79Updated 3 years ago
- ☆54Updated last year
- Zeek Extension to Collect Metadata for Profiling of Endpoints and Proxies☆38Updated 3 months ago
- Mapping NSM rules to MITRE ATT&CK☆73Updated 5 years ago
- S2AN - Mapper of Sigma/Suricata Rules/Signatures ➡️ MITRE ATT&CK Navigator☆90Updated 3 years ago
- ☆38Updated last year
- A STIX 2.1 Extension Definition for the Course of Action (COA) object type. The nested property extension allows a COA to share machine-r…☆23Updated 2 years ago
- 🚌 Threat Bus – A threat intelligence dissemination layer for open-source security tools.☆267Updated 2 years ago
- Sigma Detection Rule Repository☆91Updated 5 years ago
- Cisco Orbital - Osquery queries by Talos☆135Updated last year
- Definition, description and relationship types of MISP objects☆104Updated this week
- ☆30Updated 4 years ago
- A website and framework for testing NIDS detection☆57Updated 4 years ago
- Zeek Training Materials/Products☆40Updated 2 weeks ago
- ☆35Updated last week
- Suricata rule and intel index☆33Updated last month