WhiteHatCyberus / SNORT-GUI
SNORT GUI: Your very own trusted blueteam forensic companion for SNORT IDS.
☆23Updated 4 months ago
Related projects ⓘ
Alternatives and complementary repositories for SNORT-GUI
- A collection of Malware Analysis software, materials, libraries, documents, books, resources about malware analysis in Cybersecurity.☆45Updated last year
- Pentest AI utilizes machine learning to fully automate penetration testing and exploitation for assessing port, web, and application secu…☆32Updated 3 months ago
- The best tools and resources for forensic analysis.☆135Updated last year
- A collection of forensics tools, software, libraries, learning tutorials, frameworks, academic and practical resources in Cybersecurity☆59Updated 2 years ago
- SSG SIEM Tool☆13Updated 10 months ago
- Cybersecurity Security Operations Center (SOC) Analyst NOW, by EC-Council☆16Updated last year
- Capture screenshots of onion services on an onion service.☆49Updated 5 months ago
- Packet captures of malicious traffic for analysis using Wireshark☆54Updated last year
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.☆128Updated last year
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆37Updated 2 years ago
- Vulnerability Assessment and Penetration Testing Tools (Information Security / Cyber security)☆26Updated 2 years ago
- The DFRWS 2023 challenge (The Troubled Elevator) takes a deep dive into the domain of Industrial Control Systems (ICS), specifically foc…☆42Updated 6 months ago
- TrafficWatch, a packet sniffer tool, allows you to monitor and analyze network traffic from PCAP files☆111Updated 5 months ago
- a curated, categorised collection of useful projects 👨👩👧☆95Updated 3 weeks ago
- forked from https://github.com/apsdehal/awesome-ctf.git☆42Updated 4 years ago
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆73Updated 4 years ago
- Suricata rules that can detect a wide range of threats, including malware, exploits, and other malicious activity especially web applicat…☆39Updated 7 months ago
- Machine Learning For Cybersecurity.☆63Updated 5 years ago
- Welcome to Project KillChain, a comprehensive GitHub repository for Red and Blue Teams. This repository houses tools, scripts, technique…☆97Updated 3 months ago
- HaxorHandbook is the ultimate cheat sheet for cybersecurity enthusiasts looking to up their game. Our comprehensive guide includes must-h…☆64Updated 8 months ago
- An Interface for AI built for cybersecurity professionals☆84Updated this week
- Hacking and Cyber Security Ebooks | For More Visit -☆77Updated 5 years ago
- Malware Detection using Machine Learning (MDML)☆47Updated last year
- A curated list of tools and resources that I use daily as a Purple-Team operator.☆34Updated 3 weeks ago
- Malware Analysis Tools☆29Updated 5 years ago
- Awesome list of AI for cybersecurity including network (network traffic analysis and intrusion detection), endpoint (anti-malware), appli…☆109Updated last year
- This is the Network Flow Generator for ICSSIM☆13Updated 3 weeks ago
- An offline Phishing Email Analyzer. Enabling non-techies to analyze phishing emails automatically!☆54Updated last year