An Installation Script for Bro IDS on Debian Based Systems
☆20Jun 25, 2020Updated 5 years ago
Alternatives and similar repositories for bro-install
Users that are interested in bro-install are comparing it to the libraries listed below
Sorting:
- Small and highly portable detection tests based on MITRE's ATT&CK.☆10Feb 17, 2025Updated last year
- Simple script to generate commands to achieve reverse shells.☆12Aug 12, 2019Updated 6 years ago
- Collection of walkthroughs on various threat hunting techniques☆76Aug 3, 2020Updated 5 years ago
- simple demo of using C# & System.Management.Automation.dll to run powershell code (b64 encoded) without powershell.exe☆14Mar 29, 2017Updated 8 years ago
- Gobbling it's way through your pcap files☆24Oct 23, 2014Updated 11 years ago
- Automatically perform advanced NTLM hash relay attacks☆15Nov 4, 2022Updated 3 years ago
- A content inspecting SMTP proxy☆17Jun 9, 2014Updated 11 years ago
- Device profile: Define acceptable amounts of traffic for your devices and see a report of outliers.☆16Jan 28, 2020Updated 6 years ago
- This module installs and configures MISP (Malware Information Sharing Platform)☆14Dec 29, 2025Updated 2 months ago
- An Ansible playbook for deploying the Suricata intrusion detection system and fetching Snort rules with Oinkmaster.☆17Oct 30, 2021Updated 4 years ago
- Generate Indexes from SANS PDFs☆18Jun 3, 2024Updated last year
- CDK app to setup an isolated AWS network to experiment with ways of exfiltrating data☆18Nov 18, 2021Updated 4 years ago
- ☆24Jan 19, 2020Updated 6 years ago
- Powershell - web traffic whitenoise generator☆47Jun 4, 2020Updated 5 years ago
- CRITs - Collaborative Research Into Threats☆21Mar 13, 2019Updated 6 years ago
- Collection of scripts used to analyse malware or emails☆20Oct 6, 2020Updated 5 years ago
- log data pre processing, generation and shipping in python☆35Updated this week
- Use Terraform to Provision Your Own Cloud-Based Remote Browsing Workstation☆26Apr 28, 2024Updated last year
- Reference sheet for Threat Hunting Professional Course☆26Mar 10, 2019Updated 6 years ago
- ☆10Sep 11, 2021Updated 4 years ago
- intrusion detection☆26Jun 14, 2017Updated 8 years ago
- Threat hunting repo for my independent study on threat hunting with OSQuery☆27Jan 16, 2018Updated 8 years ago
- Old home of LimaCharlie, open source EDR☆32Sep 4, 2023Updated 2 years ago
- Simple NGram Fast Indexer & Searcher☆37Jan 6, 2023Updated 3 years ago
- Generates visualizations from the output of flow tools such as SiLK.☆35Dec 8, 2016Updated 9 years ago
- A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the…☆62Nov 26, 2025Updated 3 months ago
- Useful resources for Zeek(https://zeek.org/) (Bro(http://bro.org/))☆30Apr 17, 2020Updated 5 years ago
- Interface for Image-Related Deep Learning Models (E.g. NSFW, MAYBE and SFW)☆33Apr 15, 2022Updated 3 years ago
- This repo contains scripts to automate the addition of 3rd party Wazuh rules to your Wazuh installation☆18Dec 31, 2023Updated 2 years ago
- Incident Response Triage - Windows Evidence Collection for Forensic Analysis☆136Apr 21, 2016Updated 9 years ago
- Mapping NSM rules to MITRE ATT&CK☆73Aug 29, 2020Updated 5 years ago
- Plugin for Zeek/Bro which provides http2 decoder/analyzer☆30Jun 11, 2024Updated last year
- A module for CME that spiders across a domain.☆35Jul 15, 2022Updated 3 years ago
- Passive service locator, a python sniffer that identifies servers, clients, names and much more☆258Feb 9, 2026Updated 2 weeks ago
- An application that displays a map and graphs showing solar irradiance forecasts in solar farms in Georgia using data from the National S…☆10Oct 15, 2021Updated 4 years ago
- Useful resources about phishing email analysis☆86Jan 31, 2025Updated last year
- Remote / Onsite Security Assessment Jumpkit☆39Aug 5, 2023Updated 2 years ago
- ☆48Jan 6, 2023Updated 3 years ago
- Utility for parsing Bro log files into CSV or JSON format☆41Jan 12, 2023Updated 3 years ago