StopDDoS / packet-capturesLinks
packet captures of real-world ddos attacks
☆167Updated 3 weeks ago
Alternatives and similar repositories for packet-captures
Users that are interested in packet-captures are comparing it to the libraries listed below
Sorting:
- ☆58Updated 7 years ago
- Let's be scanned. A low-interaction honeypot focused on network scanners and bots. It integrates very well with IVRE to build a self-host…☆129Updated last week
- DGA Detective - Hunt domains generated by Domain Generation Algorithms to identify malware traffic☆45Updated last year
- Suricata rules for network anomaly detection☆174Updated last week
- LZR quickly detects and fingerprints unexpected services running on unexpected ports.☆183Updated 6 months ago
- Python rewrite of passive OS fingerprinting tool☆189Updated 5 months ago
- GPS is a scanning platform that learns and predicts the location of IPv4 services across all 65K ports.☆74Updated 2 years ago
- Convert pcap files into richly-typed ZNG summary logs (Zeek, Suricata, and more)☆91Updated 6 months ago
- Standard-Format Threat Intelligence Feeds☆124Updated this week
- GQUIC Protocol Analyzer for Zeek (Bro) Network Security Monitor☆79Updated 2 years ago
- Suricata Language Server is an implementation of the Language Server Protocol for Suricata signatures. It adds syntax check, hints and au…☆80Updated 2 weeks ago
- tshark + ELK analytics virtual machine☆69Updated 9 months ago
- BGP ranking is a free software to calculate the security ranking of Internet Service Provider (ASN)☆75Updated last month
- Open source endpoint agent providing host information to Zeek. [v2]☆86Updated this week
- PcapMonkey will provide an easy way to analyze pcap using the latest version of Suricata and Zeek.☆158Updated 7 months ago
- censors pose a threat to the entire Internet☆139Updated 4 years ago
- Passive DNS Capture and Monitoring Toolkit☆343Updated this week
- A wireshark/tshark plugin for the JA3 TLS Client Fingerprinting Algorithm☆59Updated 2 years ago
- An open-source, real-time Security Information & Event Management tool based on big data technologies, providing a scalable, advanced sec…☆207Updated 6 months ago
- Entropy scanner for Linux to detect packed or encrypted binaries related to malware. Finds malicious files and Linux processes and gives …☆165Updated last year
- DynamiteNSM is a free Network Security Monitor developed by Dynamite Analytics to enable network visibility and advanced cyber threat det…☆171Updated 2 years ago
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆37Updated 3 years ago
- The Security Analyst’s Guide to Suricata☆59Updated 6 months ago
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆141Updated 8 months ago
- NTP, DNS, SSDP, Chargen and generic UDP-based amplification DDoS honeypot☆59Updated 4 years ago
- Software responsible for extracting DDoS Fingerprints from traffic captures.☆70Updated 3 months ago
- Accurate, modular, scalable PCAP manipulation tool written in Go.☆94Updated last year
- A honeypot for the Log4Shell vulnerability (CVE-2021-44228).☆91Updated 11 months ago
- A repository for possible zgrab2 configurations☆27Updated 2 years ago
- findCDN is a tool created to help accurately identify what CDN a domain is using.☆120Updated 3 weeks ago