activecm / sniffer-templateLinks
Template for building a packet sniffer
☆14Updated last year
Alternatives and similar repositories for sniffer-template
Users that are interested in sniffer-template are comparing it to the libraries listed below
Sorting:
- Learn about a network from a pcap file or reading from an interface☆29Updated last year
- Device profile: Define acceptable amounts of traffic for your devices and see a report of outliers.☆16Updated 5 years ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆80Updated last month
- a port made of honey for blocking people☆13Updated 5 years ago
- Run zeek with zeekctl in docker☆56Updated last year
- Synthetic Adversarial Log Objects: A Framework for synthentic log generation☆85Updated last year
- ☆43Updated this week
- Passive OS detection based on SYN packets without Transmitting any Data☆49Updated 2 years ago
- Search a filesystem for indicators of compromise (IoC).☆81Updated last month
- ☆93Updated 2 weeks ago
- The Infosec Community Definitive Guide to Jupyter Notebooks☆129Updated 5 years ago
- Passive service locator, a python sniffer that identifies servers, clients, names and much more☆256Updated 2 years ago
- Extracts fields from zeek logs, compatible with zeek-cut☆23Updated last year
- ☆72Updated 7 months ago
- MISP-STIX-Converter - Python library to handle the conversion between MISP and STIX formats☆56Updated this week
- Corelight@Home script☆45Updated 2 years ago
- Use Terraform to Provision Your Own Cloud-Based Remote Browsing Workstation☆26Updated last year
- A tool that allows you to document and assess any security automation in your SOC☆47Updated last year
- Incident Response Network Tools☆24Updated 4 years ago
- ☆55Updated 3 years ago
- Cleanup of older MISP events can require some work until now☆27Updated 2 months ago
- The FASTEST way to consume threat intel.☆69Updated 2 years ago
- Intrusion Detection Honeypots Book Code☆26Updated 5 years ago
- A collection of tips for using MISP.☆74Updated 11 months ago
- Import CrowdStrike Threat Intelligence into your instance of MISP☆48Updated 5 months ago
- an awesome list of active defense resources☆126Updated 5 years ago
- ☆27Updated 3 months ago
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆59Updated 3 years ago
- Scapy packet fragment reassembly engines☆33Updated 4 years ago
- Scripts to inject demo data and network traffic into an existing Alienvault/OSSIM installation☆21Updated 8 years ago