StopDDoS / packet-captures
packet captures of real-world ddos attacks
☆161Updated 2 years ago
Alternatives and similar repositories for packet-captures:
Users that are interested in packet-captures are comparing it to the libraries listed below
- OpenWRT Suricata package☆49Updated 7 years ago
- Suricata Language Server is an implementation of the Language Server Protocol for Suricata signatures. It adds syntax check, hints and au…☆70Updated 2 weeks ago
- LZR quickly detects and fingerprints unexpected services running on unexpected ports.☆172Updated 2 months ago
- ☆49Updated 6 years ago
- Suricata rules for network anomaly detection☆160Updated last week
- The Security Analyst’s Guide to Suricata☆55Updated 10 months ago
- Suricata Verification Tests - Testing Suricata Output☆106Updated this week
- PcapMonkey will provide an easy way to analyze pcap using the latest version of Suricata and Zeek.☆153Updated 3 weeks ago
- Accurate, modular, scalable PCAP manipulation tool written in Go.☆87Updated 11 months ago
- For the final part of my Bachelor in Computer Science, the research project, I aim to automatically generate DDoS mitigation rules for th…☆10Updated 6 years ago
- Let's be scanned. A low-interaction honeypot focused on network scanners and bots. It integrates very well with IVRE to build a self-host…☆120Updated 3 weeks ago
- BGP ranking is a free software to calculate the security ranking of Internet Service Provider (ASN)☆72Updated 9 months ago
- NTP, DNS, SSDP, Chargen and generic UDP-based amplification DDoS honeypot☆55Updated 4 years ago
- Open source endpoint agent providing host information to Zeek. [v2]☆80Updated this week
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆95Updated 3 years ago
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆35Updated 2 years ago
- Convert pcap files into richly-typed ZNG summary logs (Zeek, Suricata, and more)☆80Updated last week
- Red Canary's eBPF Sensor☆104Updated 9 months ago
- A platform built for easy-to-use automated network traffic analysis☆59Updated 2 years ago
- A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the…☆62Updated 2 years ago
- Entropy scanner for Linux to detect packed or encrypted binaries related to malware. Finds malicious files and Linux processes and gives …☆153Updated 10 months ago
- Sandfly Security Agentless Compromise and Intrusion Detection System For Linux☆79Updated this week
- A curated list of awesome things related to Suricata☆166Updated last month
- Cyber Threat Intelligence Data, Indicators, and Analysis☆84Updated 4 months ago
- Zeek-Formatted Threat Intelligence Feeds☆359Updated this week
- Honeyscanner: A vulnerability analyzer for honeypots☆38Updated 8 months ago
- ☆38Updated 5 months ago
- Python rewrite of passive OS fingerprinting tool☆172Updated 9 months ago
- Suricata, Snort and Zeek IDS rule and pcap testing system☆474Updated 3 months ago
- Wireshark plugin to display Suricata analysis info☆93Updated 3 years ago