StopDDoS / packet-capturesLinks
packet captures of real-world ddos attacks
☆163Updated last week
Alternatives and similar repositories for packet-captures
Users that are interested in packet-captures are comparing it to the libraries listed below
Sorting:
- ☆57Updated 6 years ago
- Suricata rules for network anomaly detection☆165Updated 3 months ago
- Convert pcap files into richly-typed ZNG summary logs (Zeek, Suricata, and more)☆82Updated 2 months ago
- Python rewrite of passive OS fingerprinting tool☆176Updated 2 months ago
- Standard-Format Threat Intelligence Feeds☆119Updated this week
- Suricata Language Server is an implementation of the Language Server Protocol for Suricata signatures. It adds syntax check, hints and au…☆76Updated last month
- LZR quickly detects and fingerprints unexpected services running on unexpected ports.☆175Updated 2 months ago
- The Security Analyst’s Guide to Suricata☆56Updated 2 months ago
- DynamiteNSM is a free Network Security Monitor developed by Dynamite Analytics to enable network visibility and advanced cyber threat det…☆170Updated 2 years ago
- BGP ranking is a free software to calculate the security ranking of Internet Service Provider (ASN)☆73Updated last year
- A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the…☆62Updated 2 years ago
- tshark + ELK analytics virtual machine☆67Updated 5 months ago
- A honeypot for the Log4Shell vulnerability (CVE-2021-44228).☆91Updated 7 months ago
- Accurate, modular, scalable PCAP manipulation tool written in Go.☆92Updated last year
- PcapMonkey will provide an easy way to analyze pcap using the latest version of Suricata and Zeek.☆155Updated 3 months ago
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆95Updated 4 years ago
- findCDN is a tool created to help accurately identify what CDN a domain is using.☆118Updated last month
- Let's be scanned. A low-interaction honeypot focused on network scanners and bots. It integrates very well with IVRE to build a self-host…☆125Updated last week
- A curated list of awesome things related to Suricata☆181Updated 4 months ago
- NTP, DNS, SSDP, Chargen and generic UDP-based amplification DDoS honeypot☆58Updated 4 years ago
- censors pose a threat to the entire Internet☆135Updated 3 years ago
- Suricata rules that can detect a wide range of threats, including malware, exploits, and other malicious activity especially web applicat…☆47Updated last year
- OpenWRT Suricata package☆51Updated 7 years ago
- Cyber Threat Intelligence Data, Indicators, and Analysis☆91Updated last month
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆141Updated 5 months ago
- Packet captures of malicious traffic for analysis using Wireshark☆59Updated 2 years ago
- Passive DNS Capture and Monitoring Toolkit☆333Updated 2 months ago
- Suricata Verification Tests - Testing Suricata Output☆111Updated this week
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆35Updated 2 years ago
- High Interaction Honeypot Solution for Redis protocol☆24Updated 4 years ago