StopDDoS / packet-captures
packet captures of real-world ddos attacks
☆156Updated 2 years ago
Alternatives and similar repositories for packet-captures:
Users that are interested in packet-captures are comparing it to the libraries listed below
- LZR quickly detects and fingerprints unexpected services running on unexpected ports.☆169Updated last month
- GPS is a scanning platform that learns and predicts the location of IPv4 services across all 65K ports.☆67Updated 2 years ago
- ☆49Updated 6 years ago
- PcapMonkey will provide an easy way to analyze pcap using the latest version of Suricata and Zeek.☆153Updated 2 weeks ago
- For the final part of my Bachelor in Computer Science, the research project, I aim to automatically generate DDoS mitigation rules for th…☆10Updated 6 years ago
- Suricata rules for network anomaly detection☆156Updated last week
- Software responsible for extracting DDoS Fingerprints from traffic captures.☆70Updated 2 months ago
- The Security Analyst’s Guide to Suricata☆54Updated 9 months ago
- Passive DNS Capture and Monitoring Toolkit☆324Updated 2 weeks ago
- Zeek-Formatted Threat Intelligence Feeds☆358Updated this week
- Argus Sensor☆61Updated last week
- Let's be scanned. A low-interaction honeypot focused on network scanners and bots. It integrates very well with IVRE to build a self-host…☆119Updated this week
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆94Updated 3 years ago
- BGP ranking is a free software to calculate the security ranking of Internet Service Provider (ASN)☆72Updated 8 months ago
- Convert pcap files into richly-typed ZNG summary logs (Zeek, Suricata, and more)☆79Updated 5 months ago
- ☆24Updated last year
- OpenWRT Suricata package☆48Updated 7 years ago
- Suricata Verification Tests - Testing Suricata Output☆105Updated this week
- Python rewrite of passive OS fingerprinting tool☆169Updated 8 months ago
- Python scripts for Malware Bazaar☆151Updated 9 months ago
- A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the…☆61Updated 2 years ago
- Suricata rules that can detect a wide range of threats, including malware, exploits, and other malicious activity especially web applicat…☆43Updated 11 months ago
- Entropy scanner for Linux to detect packed or encrypted binaries related to malware. Finds malicious files and Linux processes and gives …☆153Updated 9 months ago
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆140Updated last month
- ☆55Updated last month
- nPrint provides a generalizable data representation for network packets that works directly with machine learning techniques☆109Updated 2 years ago
- Accurate, modular, scalable PCAP manipulation tool written in Go.☆87Updated 11 months ago
- Standard-Format Threat Intelligence Feeds☆112Updated this week
- Red Canary's eBPF Sensor☆103Updated 8 months ago
- This repository contains a comprehensive list of over 30k dynamic DNS domains as of 2024. The list is provided for informational purposes…☆90Updated 3 months ago