StopDDoS / packet-capturesLinks
packet captures of real-world ddos attacks
☆163Updated 3 years ago
Alternatives and similar repositories for packet-captures
Users that are interested in packet-captures are comparing it to the libraries listed below
Sorting:
- ☆55Updated 6 years ago
- LZR quickly detects and fingerprints unexpected services running on unexpected ports.☆174Updated 2 months ago
- Suricata rules for network anomaly detection☆164Updated 2 months ago
- Suricata rules that can detect a wide range of threats, including malware, exploits, and other malicious activity especially web applicat…☆46Updated last year
- Suricata Verification Tests - Testing Suricata Output☆110Updated this week
- Python rewrite of passive OS fingerprinting tool☆176Updated last month
- Let's be scanned. A low-interaction honeypot focused on network scanners and bots. It integrates very well with IVRE to build a self-host…☆125Updated 2 weeks ago
- Zeek-Formatted Threat Intelligence Feeds☆373Updated this week
- Convert pcap files into richly-typed ZNG summary logs (Zeek, Suricata, and more)☆82Updated 2 months ago
- Suricata Language Server is an implementation of the Language Server Protocol for Suricata signatures. It adds syntax check, hints and au…☆72Updated last week
- PcapMonkey will provide an easy way to analyze pcap using the latest version of Suricata and Zeek.☆154Updated 3 months ago
- Standard-Format Threat Intelligence Feeds☆117Updated this week
- Open source endpoint agent providing host information to Zeek. [v2]☆83Updated last week
- OpenWRT Suricata package☆51Updated 7 years ago
- Accurate, modular, scalable PCAP manipulation tool written in Go.☆89Updated last year
- Collection of Snort 2/3 rules.☆36Updated 7 years ago
- The Security Analyst’s Guide to Suricata☆56Updated 2 months ago
- Argus Sensor☆67Updated last month
- A curated list of awesome things related to Suricata☆180Updated 3 months ago
- Red Canary's eBPF Sensor☆107Updated 2 weeks ago
- Passive DNS Capture and Monitoring Toolkit☆330Updated last month
- BGP ranking is a free software to calculate the security ranking of Internet Service Provider (ASN)☆73Updated 11 months ago
- DGA Detective - Hunt domains generated by Domain Generation Algorithms to identify malware traffic☆42Updated 10 months ago
- NTP, DNS, SSDP, Chargen and generic UDP-based amplification DDoS honeypot☆58Updated 4 years ago
- Suricata Extreme Performance Tuning guide - Mark II☆117Updated 7 years ago
- GPS is a scanning platform that learns and predicts the location of IPv4 services across all 65K ports.☆70Updated 2 years ago
- A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the…☆62Updated 2 years ago
- For the final part of my Bachelor in Computer Science, the research project, I aim to automatically generate DDoS mitigation rules for th…☆11Updated 6 years ago
- IOK (Indicator Of Kit) is an open source language and ruleset for detecting phishing threat actor tools and tactics☆185Updated 2 months ago
- GQUIC Protocol Analyzer for Zeek (Bro) Network Security Monitor☆78Updated last year