StamusNetworks / suricata-analyticsLinks
☆36Updated 3 weeks ago
Alternatives and similar repositories for suricata-analytics
Users that are interested in suricata-analytics are comparing it to the libraries listed below
Sorting:
- The Security Analyst’s Guide to Suricata☆57Updated 3 months ago
- Create dataset for suricata with indicators of MISP instances and add sightings in MISP if an indicator of dataset generates an alert☆36Updated 2 years ago
- MISP-STIX-Converter - Python library to handle the conversion between MISP and STIX formats☆55Updated 2 weeks ago
- Cleanup of older MISP events can require some work until now☆27Updated 2 years ago
- Docker image for MISP☆132Updated last month
- Threat Detection & Anomaly Detection rules for popular open-source components☆52Updated 3 years ago
- Cerebrate is an open-source platform meant to act as a trusted contact information provider and interconnection orchestrator for other se…☆90Updated last month
- ☆40Updated 4 months ago
- The FASTEST way to consume threat intel.☆68Updated 2 years ago
- Zeek Training Materials/Products☆39Updated 2 months ago
- Run zeek with zeekctl in docker☆54Updated 10 months ago
- ☆72Updated 4 months ago
- Technical add-on for Splunk related to TheHive/Cortex from TheHive project☆53Updated 3 weeks ago
- Learn about a network from a pcap file or reading from an interface☆29Updated last year
- Suricata Language Server is an implementation of the Language Server Protocol for Suricata signatures. It adds syntax check, hints and au…☆79Updated last month
- ☆52Updated 3 years ago
- A collection of tips for using MISP.☆74Updated 7 months ago
- Zeek support for Community ID flow hashing.☆36Updated 2 years ago
- The Project can be used to integrate QRadar with MISP Threat Sharing Platform☆39Updated 3 years ago
- Pulls IOCs from MISP and adds the to reference sets in QRadar☆34Updated 2 years ago
- MISP to Splunk Enterprise Security Theat Intelligence Framework Integration☆13Updated 2 years ago
- A website and framework for testing NIDS detection☆57Updated 3 years ago
- A community event for security researchers to share their favorite notebooks☆108Updated last year
- ☆38Updated 9 months ago
- ☆28Updated 4 years ago
- SIEGMA - Transform Sigma rules into SIEM consumables☆153Updated 4 months ago
- This repository includes a mapping table and a reference process that allows converting between STIX 2.1 Course of Action objects that ma…☆16Updated 2 years ago
- Open source endpoint agent providing host information to Zeek. [v2]☆85Updated last month
- Synthetic Adversarial Log Objects: A Framework for synthentic log generation☆83Updated last year
- Interface LLMs from within MISP to extract TTPs and threat intel from CTI reports☆18Updated last year