TravisFSmith / SweetSecurity
Network Security Monitoring on Raspberry Pi type devices
☆785Updated 7 years ago
Alternatives and similar repositories for SweetSecurity:
Users that are interested in SweetSecurity are comparing it to the libraries listed below
- Automated deployment scripts for the RockNSM network hunting distribution.☆453Updated last year
- An All-In-One home intrusion detection system (IDS) solution for the Raspberry PI.☆220Updated last year
- The Artillery Project is an open-source blue team tool designed to protect Linux and Windows operating systems through multiple methods.☆1,017Updated 3 years ago
- Home of the dionaea honeypot☆739Updated 8 months ago
- Honeypot Intelligence with Splunk☆254Updated 6 years ago
- Incident Response Forensic Framework☆600Updated 5 years ago
- "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security …☆1,010Updated 4 years ago
- A low to medium interaction honeypot.☆466Updated last year
- Malicious HTTP traffic explorer☆716Updated 2 years ago
- A tool for deploying and detecting use of Active Directory honeytokens☆506Updated 2 years ago
- Sguil client for NSM☆218Updated last year
- Code + documentation for the public GreyNoise API☆314Updated 4 years ago
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,268Updated 3 months ago
- Create actionable data from your Vulnerability Scans☆1,378Updated 2 years ago
- DPS' Lightweight Investigation Notebook☆429Updated last year
- 'Packet Capture Forensic Evidence eXtractor' is a tool that finds and extracts files from packet capture files☆220Updated 5 years ago
- Collect, Process, and Hunt with host based data from MacOS, Windows, and Linux☆500Updated 2 years ago
- The GOSINT framework is a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs).☆543Updated last year
- Builds malware analysis Windows VMs so that you don't have to.☆1,040Updated 3 years ago
- Security Onion 16.04 - Linux distro for threat hunting, enterprise security monitoring, and log management☆3,085Updated 4 years ago
- An information security preparedness tool to do adversarial simulation.☆1,121Updated 6 years ago
- DShield Raspberry Pi Sensor☆466Updated this week
- ☆199Updated 3 years ago
- FAME Automates Malware Evaluation☆892Updated last week
- Laika BOSS: Object Scanning System☆745Updated 4 months ago
- Machinae Security Intelligence Collector☆512Updated 11 months ago
- FireEye Publicly Shared Indicators of Compromise (IOCs)☆464Updated 6 years ago
- The Correlated CVE Vulnerability And Threat Intelligence Database API☆943Updated 3 years ago
- Modern Honey Network☆2,447Updated 4 months ago
- A tool to retrieve malware directly from the source for security researchers.☆563Updated 7 years ago