StopDDoS / packet-capturesLinks
packet captures of real-world ddos attacks
☆166Updated 3 months ago
Alternatives and similar repositories for packet-captures
Users that are interested in packet-captures are comparing it to the libraries listed below
Sorting:
- LZR quickly detects and fingerprints unexpected services running on unexpected ports.☆192Updated 3 weeks ago
- Python rewrite of passive OS fingerprinting tool☆204Updated last month
- GPS is a scanning platform that learns and predicts the location of IPv4 services across all 65K ports.☆77Updated 2 years ago
- Suricata rules for network anomaly detection☆182Updated 2 months ago
- PcapMonkey will provide an easy way to analyze pcap using the latest version of Suricata and Zeek.☆162Updated 10 months ago
- Let's be scanned. A low-interaction honeypot focused on network scanners and bots. It integrates very well with IVRE to build a self-host…☆135Updated 2 weeks ago
- A network packet forensics tool for SSH☆254Updated 4 years ago
- Convert pcap files into richly-typed ZNG summary logs (Zeek, Suricata, and more)☆92Updated 9 months ago
- ☆68Updated 7 years ago
- tshark + ELK analytics virtual machine☆68Updated last year
- Suricata Language Server is an implementation of the Language Server Protocol for Suricata signatures. It adds syntax check, hints and au…☆84Updated last month
- The Security Analyst’s Guide to Suricata☆61Updated 9 months ago
- findCDN is a tool created to help accurately identify what CDN a domain is using.☆121Updated last month
- censors pose a threat to the entire Internet☆141Updated 4 years ago
- Passive DNS Capture and Monitoring Toolkit☆350Updated last week
- ☆60Updated 11 months ago
- A wireshark/tshark plugin for the JA3 TLS Client Fingerprinting Algorithm☆60Updated 2 years ago
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆140Updated 11 months ago
- Entropy scanner for Linux to detect packed or encrypted binaries related to malware. Finds malicious files and Linux processes and gives …☆167Updated last year
- A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the…☆62Updated 2 months ago
- DGA Detective - Hunt domains generated by Domain Generation Algorithms to identify malware traffic☆45Updated last year
- PROJECT DELTA: SDN SECURITY EVALUATION FRAMEWORK☆89Updated 2 years ago
- DynamiteNSM is a free Network Security Monitor developed by Dynamite Analytics to enable network visibility and advanced cyber threat det…☆172Updated 2 years ago
- GQUIC Protocol Analyzer for Zeek (Bro) Network Security Monitor☆80Updated 2 years ago
- Extensible framework for analyzing publicly available information about vulnerabilities☆127Updated last month
- Open source endpoint agent providing host information to Zeek. [v2]☆90Updated this week
- How to setup a honeypot with an IDS, ELK and TLS traffic inspection☆164Updated 3 years ago
- A curated list of awesome things related to Suricata☆216Updated 2 months ago
- Accurate, modular, scalable PCAP manipulation tool written in Go.☆96Updated last year
- Suricata rule and intel index☆33Updated 2 weeks ago