StamusNetworks / suricata-analyticsLinks
☆36Updated last month
Alternatives and similar repositories for suricata-analytics
Users that are interested in suricata-analytics are comparing it to the libraries listed below
Sorting:
- The Security Analyst’s Guide to Suricata☆59Updated 5 months ago
- The FASTEST way to consume threat intel.☆69Updated 2 years ago
- Suricata Language Server is an implementation of the Language Server Protocol for Suricata signatures. It adds syntax check, hints and au…☆79Updated 4 months ago
- Run zeek with zeekctl in docker☆55Updated last year
- MISP-STIX-Converter - Python library to handle the conversion between MISP and STIX formats☆56Updated this week
- Zeek Training Materials/Products☆39Updated 4 months ago
- Create dataset for suricata with indicators of MISP instances and add sightings in MISP if an indicator of dataset generates an alert☆36Updated 2 years ago
- Cleanup of older MISP events can require some work until now☆27Updated last month
- A collection of tips for using MISP.☆74Updated 10 months ago
- Technical add-on for Splunk related to TheHive/Cortex from TheHive project☆53Updated last month
- ☆53Updated 3 years ago
- Cerebrate is an open-source platform meant to act as a trusted contact information provider and interconnection orchestrator for other se…☆90Updated 3 weeks ago
- Threat Detection & Anomaly Detection rules for popular open-source components☆53Updated 3 years ago
- Zeek support for Community ID flow hashing.☆37Updated 2 years ago
- Learn about a network from a pcap file or reading from an interface☆29Updated last year
- Zeek Auxiliary Programs☆28Updated last week
- Docker image for MISP☆134Updated 2 months ago
- ☆38Updated 11 months ago
- Pulls IOCs from MISP and adds the to reference sets in QRadar☆34Updated 2 years ago
- Awesome Splunk SPL hunt queries that can be used to detect the latest vulnerability exploitation attempts & subsequent compromise☆66Updated last year
- ☆72Updated 6 months ago
- A website and framework for testing NIDS detection☆57Updated 4 years ago
- Synthetic Adversarial Log Objects: A Framework for synthentic log generation☆85Updated last year
- Log4j Exploit Detection Logic for Zeek☆19Updated last year
- SIEGMA - Transform Sigma rules into SIEM consumables☆156Updated 7 months ago
- A curated list of awesome things related to TheHive & Cortex☆182Updated 4 years ago
- ☆42Updated 6 months ago
- ☆28Updated this week
- Convert Sigma rules to Wazuh rules☆73Updated last month
- Mapping Corelight or Zeek data to Elastic Common Schema fields☆34Updated last month