activecm / sniffer-template
Template for building a packet sniffer
☆14Updated 7 months ago
Related projects ⓘ
Alternatives and complementary repositories for sniffer-template
- Learn about a network from a pcap file or reading from an interface☆27Updated 7 months ago
- Device profile: Define acceptable amounts of traffic for your devices and see a report of outliers.☆16Updated 4 years ago
- Zeek Auxiliary Programs☆26Updated 2 months ago
- Tool used to perform threat intelligence against packet data☆35Updated 7 months ago
- Run zeek with zeekctl in docker☆50Updated 2 months ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆67Updated last year
- ☆34Updated 3 years ago
- Passive OS detection based on SYN packets without Transmitting any Data☆45Updated last year
- The FASTEST way to consume threat intel.☆64Updated last year
- ☆46Updated 2 years ago
- A system that creates a bogus web structure to entrap and delay web scanners☆52Updated 3 years ago
- misp-cloud - Cloud-ready images of MISP☆72Updated 2 years ago
- ☆47Updated this week
- Collection of walkthroughs on various threat hunting techniques☆75Updated 4 years ago
- Hands-On Network Forensics by Nipun Jaswal☆41Updated last year
- A PoC backdoor that uses Gmail as a C&C server☆12Updated 4 years ago
- Import CrowdStrike Threat Intelligence into your instance of MISP☆42Updated last month
- Notes for High Availability MISP in AWS☆19Updated 5 years ago
- A collection of tips for using MISP.☆74Updated 7 months ago
- Corelight@Home script☆40Updated last year
- Intrusion Detection Honeypots Book Code☆24Updated 4 years ago
- An open source platform to support analysts to organise their case and tasks☆55Updated this week
- Collects a listing of MITRE ATT&CK Techniques, then discovers Splunk ESCU detections for each technique☆65Updated 8 months ago
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆35Updated 2 years ago
- ☆31Updated 3 months ago
- Scapy packet fragment reassembly engines☆34Updated 3 years ago
- A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the…☆61Updated 2 years ago
- Threat Detection & Anomaly Detection rules for popular open-source components☆50Updated 2 years ago
- Open source training materials for law-enforcement and organisations interested in DFIR.☆56Updated 2 months ago
- Re-play Adversarial Techniques☆26Updated 3 years ago