activecm / sniffer-templateLinks
Template for building a packet sniffer
☆14Updated last year
Alternatives and similar repositories for sniffer-template
Users that are interested in sniffer-template are comparing it to the libraries listed below
Sorting:
- Learn about a network from a pcap file or reading from an interface☆29Updated last year
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆74Updated 3 weeks ago
- Device profile: Define acceptable amounts of traffic for your devices and see a report of outliers.☆16Updated 5 years ago
- Run zeek with zeekctl in docker☆55Updated last year
- a port made of honey for blocking people☆13Updated 5 years ago
- Passive OS detection based on SYN packets without Transmitting any Data☆47Updated 2 years ago
- ☆53Updated 3 years ago
- ☆72Updated 6 months ago
- A web front-end providing a REST-ful API to mount and unmount forensic disk images☆23Updated this week
- The Infosec Community Definitive Guide to Jupyter Notebooks☆126Updated 4 years ago
- ☆90Updated 2 weeks ago
- Get started using Synapse Open-Source to start a Cortex and perform analysis within your area of expertise.☆48Updated 3 years ago
- Collection of walkthroughs on various threat hunting techniques☆75Updated 5 years ago
- Bring Your Own Mitre Att&ck © Matrix !☆13Updated last year
- Extracts fields from zeek logs, compatible with zeek-cut☆23Updated last year
- Incident Response Network Tools☆24Updated 4 years ago
- ☆42Updated 6 months ago
- The FASTEST way to consume threat intel.☆69Updated 2 years ago
- Import CrowdStrike Threat Intelligence into your instance of MISP☆48Updated 4 months ago
- Zeek Auxiliary Programs☆28Updated last month
- A collection of tips for using MISP.☆74Updated 10 months ago
- MISP-STIX-Converter - Python library to handle the conversion between MISP and STIX formats☆55Updated this week
- ☆25Updated 2 months ago
- pySigma Splunk backend☆41Updated last month
- Tool used to perform threat intelligence against packet data☆35Updated 8 months ago
- Search a filesystem for indicators of compromise (IoC).☆81Updated this week
- an awesome list of active defense resources☆126Updated 5 years ago
- Use Terraform to Provision Your Own Cloud-Based Remote Browsing Workstation☆26Updated last year
- Corelight@Home script☆44Updated 2 years ago
- ☆11Updated 4 years ago