StopDDoS / packet-capturesLinks
packet captures of real-world ddos attacks
☆162Updated 3 years ago
Alternatives and similar repositories for packet-captures
Users that are interested in packet-captures are comparing it to the libraries listed below
Sorting:
- Suricata rules for network anomaly detection☆164Updated last month
- LZR quickly detects and fingerprints unexpected services running on unexpected ports.☆173Updated last month
- Software responsible for extracting DDoS Fingerprints from traffic captures.☆70Updated last month
- Suricata Verification Tests - Testing Suricata Output☆108Updated this week
- Convert pcap files into richly-typed ZNG summary logs (Zeek, Suricata, and more)☆81Updated last month
- Accurate, modular, scalable PCAP manipulation tool written in Go.☆89Updated last year
- Let's be scanned. A low-interaction honeypot focused on network scanners and bots. It integrates very well with IVRE to build a self-host…☆121Updated last week
- findCDN is a tool created to help accurately identify what CDN a domain is using.☆118Updated 2 weeks ago
- Passive DNS Capture and Monitoring Toolkit☆329Updated 3 weeks ago
- Python rewrite of passive OS fingerprinting tool☆177Updated last month
- Suricata Language Server is an implementation of the Language Server Protocol for Suricata signatures. It adds syntax check, hints and au…☆71Updated 3 weeks ago
- A distributed nmap / masscan scanning framework complete with scan scheduling, engine pooling, subsequent scan port diff-ing, and an API …☆169Updated 3 years ago
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆95Updated 4 years ago
- BGP ranking is a free software to calculate the security ranking of Internet Service Provider (ASN)☆72Updated 11 months ago
- Zeek-Formatted Threat Intelligence Feeds☆367Updated this week
- PcapMonkey will provide an easy way to analyze pcap using the latest version of Suricata and Zeek.☆153Updated 2 months ago
- DGA Detective - Hunt domains generated by Domain Generation Algorithms to identify malware traffic☆42Updated 10 months ago
- ☆55Updated 6 years ago
- Packet captures of malicious traffic for analysis using Wireshark☆58Updated last year
- Download pcap files from http://www.malware-traffic-analysis.net/☆79Updated 7 years ago
- A network packet forensics tool for SSH☆252Updated 4 years ago
- A curated list of awesome things related to Suricata☆174Updated 3 months ago
- The Security Analyst’s Guide to Suricata☆56Updated last month
- For the final part of my Bachelor in Computer Science, the research project, I aim to automatically generate DDoS mitigation rules for th…☆11Updated 6 years ago
- Cisco Orbital - Osquery queries by Talos☆131Updated 9 months ago
- Red Canary's eBPF Sensor☆107Updated 3 weeks ago
- Suricata Extreme Performance Tuning guide - Mark II☆117Updated 7 years ago
- Open source endpoint agent providing host information to Zeek. [v2]☆82Updated this week
- Suricata rules that can detect a wide range of threats, including malware, exploits, and other malicious activity especially web applicat…☆46Updated last year
- Security event correlation engine for ELK stack☆439Updated 11 months ago