WhiteHatCyberus / SNORT-GUI
SNORT GUI: Your very own trusted blueteam forensic companion for SNORT IDS.
☆23Updated 7 months ago
Alternatives and similar repositories for SNORT-GUI:
Users that are interested in SNORT-GUI are comparing it to the libraries listed below
- Suricata rules that can detect a wide range of threats, including malware, exploits, and other malicious activity especially web applicat…☆43Updated 11 months ago
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆55Updated 8 months ago
- Machine Learning For Cybersecurity.☆65Updated 5 years ago
- This is the Network Flow Generator for ICSSIM☆13Updated 4 months ago
- The official Prelude SIEM GitHub of https://www.prelude-siem.org☆26Updated 8 years ago
- Graphical Realism Framework for Industrial Control Simulation (GRFICS) version 3☆32Updated 3 years ago
- Static and Dynamic Analysis of Malware Samples☆11Updated 4 years ago
- ☆48Updated 6 years ago
- A list of attacks or malware using steganography or information hiding☆61Updated last year
- This is the ICSSIM source code and user manual for simulating industrial control system testbed for cybersecurity experiments☆72Updated 8 months ago
- Honeyscanner: A vulnerability analyzer for honeypots☆35Updated 6 months ago
- 🧬 Mitre Interactive Network Graph (APTs, Malware, Tools, Techniques & Tactics)☆91Updated 2 years ago
- ☆27Updated 4 years ago
- ☆56Updated 2 years ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆105Updated 2 years ago
- Open Source Intelligence (OSINT) Tool List for Cyber Threat Intelligence Researchers☆22Updated 9 months ago
- Kali Linux extra useful packages for CTF and Pentest activities☆10Updated this week
- Malware Detection using Machine Learning (MDML)☆48Updated 2 years ago
- Notes and IoCs of fresh malware☆57Updated 7 months ago
- Packet captures of malicious traffic for analysis using Wireshark☆57Updated last year
- Just some lists of Malware Configs☆168Updated last month
- Generate a MITRE ATT&CK Navigator based on a list of CVEs. Database with CVE, CWE, CAPEC, and MITRE ATT&CK Techniques data is updated dai…☆76Updated this week
- An Intrusion Detection System written in Python☆26Updated last year
- Malware Sandboxes & Malware Source☆89Updated 7 years ago
- URL fingerprinting made easy☆86Updated 10 months ago
- Sandfly Security Agentless Compromise and Intrusion Detection System For Linux☆72Updated last week
- BlueBox Malware analysis Box and Cyber threat intelligence.☆40Updated 2 years ago
- A curated dataset of malware and benign Windows executable samples for malware researchers☆43Updated 4 months ago
- A Proof-of-Concept tool utilizing open DNS resolvers to produce an amplification attack against web servers. Using Shodan APIs and native…☆59Updated 2 years ago
- A collection of reports and case studies to understand the threat landscape for UK critical infrastructure☆38Updated last year