StopDDoS / packet-captures
packet captures of real-world ddos attacks
☆147Updated 2 years ago
Alternatives and similar repositories for packet-captures:
Users that are interested in packet-captures are comparing it to the libraries listed below
- Suricata rules for network anomaly detection☆155Updated last week
- ☆46Updated 6 years ago
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆95Updated 3 years ago
- Suricata Language Server is an implementation of the Language Server Protocol for Suricata signatures. It adds syntax check, hints and au…☆66Updated 2 weeks ago
- Cyber Threat Intelligence Data, Indicators, and Analysis☆81Updated last month
- LZR quickly detects and fingerprints unexpected services running on unexpected ports.☆162Updated this week
- DGA Detective - Hunt domains generated by Domain Generation Algorithms to identify malware traffic☆39Updated 5 months ago
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆139Updated 3 years ago
- Suricata rules that can detect a wide range of threats, including malware, exploits, and other malicious activity especially web applicat…☆41Updated 9 months ago
- PcapMonkey will provide an easy way to analyze pcap using the latest version of Suricata and Zeek.☆148Updated 11 months ago
- Accurate, modular, scalable PCAP manipulation tool written in Go.☆86Updated 9 months ago
- The Security Analyst’s Guide to Suricata☆53Updated 7 months ago
- IOK (Indicator Of Kit) is an open source language and ruleset for detecting phishing threat actor tools and tactics☆173Updated 2 months ago
- Let's be scanned. A low-interaction honeypot focused on network scanners and bots. It integrates very well with IVRE to build a self-host…☆116Updated last week
- Zeek-Formatted Threat Intelligence Feeds☆347Updated this week
- For the final part of my Bachelor in Computer Science, the research project, I aim to automatically generate DDoS mitigation rules for th…☆10Updated 6 years ago
- Convert pcap files into richly-typed ZNG summary logs (Zeek, Suricata, and more)☆79Updated 3 months ago
- Python rewrite of passive OS fingerprinting tool☆158Updated 6 months ago
- Software responsible for extracting DDoS Fingerprints from traffic captures.☆69Updated 4 months ago
- Standard-Format Threat Intelligence Feeds☆106Updated this week
- DynamiteNSM is a free Network Security Monitor developed by Dynamite Analytics to enable network visibility and advanced cyber threat det…☆167Updated last year
- Open source endpoint agent providing host information to Zeek. [v2]☆72Updated 3 months ago
- A curated list of awesome things related to Suricata☆153Updated last month
- Collection of Snort 2/3 rules.☆34Updated 6 years ago
- OpenWRT Suricata package☆45Updated 6 years ago
- Suricata Verification Tests - Testing Suricata Output☆104Updated this week
- Configuring the Suricata IDS to detect DoS attacks by adding custom rule file.☆39Updated 4 years ago
- A honeypot for the Log4Shell vulnerability (CVE-2021-44228).☆91Updated 2 months ago
- findCDN is a tool created to help accurately identify what CDN a domain is using.☆104Updated 5 months ago
- Passive DNS Capture and Monitoring Toolkit☆320Updated 3 weeks ago