activecm / zcutterLinks
Extracts fields from zeek logs, compatible with zeek-cut
☆23Updated last year
Alternatives and similar repositories for zcutter
Users that are interested in zcutter are comparing it to the libraries listed below
Sorting:
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆73Updated 2 years ago
- ☆55Updated 4 years ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆49Updated last year
- Passive OS detection based on SYN packets without Transmitting any Data☆47Updated 2 years ago
- My Jupyter Notebooks☆36Updated 6 months ago
- an awesome list of active defense resources☆125Updated 5 years ago
- Collection of walkthroughs on various threat hunting techniques☆75Updated 5 years ago
- ☆72Updated 2 years ago
- ☆67Updated last week
- Corelight@Home script☆44Updated last year
- Distribution of the SANS SEC504 Windows Cheat Sheet Lab☆71Updated 5 years ago
- Collects a listing of MITRE ATT&CK Techniques, then discovers Splunk ESCU detections for each technique☆67Updated last year
- ☆45Updated 2 years ago
- Tool used to perform threat intelligence against packet data☆35Updated 7 months ago
- Practical Threat Detection Engineering, Published by Packt☆76Updated 2 years ago
- A collection of tips for using MISP.☆74Updated 9 months ago
- Powershell - web traffic whitenoise generator☆47Updated 5 years ago
- Learn about a network from a pcap file or reading from an interface☆29Updated last year
- Run Velociraptor on Security Onion☆39Updated 3 years ago
- Conference presentations☆59Updated 2 weeks ago
- ☆53Updated 3 years ago
- Wrap any binary into a cached webserver☆54Updated 3 years ago
- Provides detection capabilities and log conversion to evtx or syslog capabilities☆54Updated 3 years ago
- Identifies physical locations where a laptop has been based upon wireless profiles and wireless data recorded in event logs☆93Updated 4 years ago
- ☆77Updated 6 years ago
- ☆90Updated this week
- Synthetic Adversarial Log Objects: A Framework for synthentic log generation☆84Updated last year
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆58Updated 3 years ago
- ☆60Updated 3 years ago
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆54Updated 3 years ago