austin-taylor / flareView external linksLinks
An analytical framework for network traffic and behavioral analytics
☆457Dec 7, 2022Updated 3 years ago
Alternatives and similar repositories for flare
Users that are interested in flare are comparing it to the libraries listed below
Sorting:
- Bluewall is a firewall framework designed for offensive and defensive cyber professionals.☆106Apr 7, 2019Updated 6 years ago
- Create actionable data from your Vulnerability Scans☆1,396Dec 27, 2022Updated 3 years ago
- ☆227Nov 9, 2023Updated 2 years ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,514Jan 12, 2026Updated last month
- An informational repo about hunting for adversaries in your IT environment.☆1,846Nov 17, 2021Updated 4 years ago
- An open source framework for enterprise level automated analysis.☆396Jun 27, 2022Updated 3 years ago
- Open Source Security Events Metadata (OSSEM)☆1,287Feb 27, 2023Updated 2 years ago
- Re-play Security Events☆1,723Mar 20, 2024Updated last year
- Contains Logstash related content including tons of Logstash configurations☆254Aug 25, 2021Updated 4 years ago
- Automated, Collection, and Enrichment Platform☆324Nov 14, 2019Updated 6 years ago
- This is a repository for freq.py and freq_server.py☆214Feb 1, 2026Updated last week
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,475Jan 12, 2026Updated last month
- Fast Incident Response☆1,988Updated this week
- Threat Feed Aggregation, Made Easy☆169Jul 13, 2020Updated 5 years ago
- A threat hunting / data analysis environment based on Python, Pandas, PySpark and Jupyter Notebook.☆252Jul 19, 2021Updated 4 years ago
- Open-source framework to detect outliers in Elasticsearch events☆208May 22, 2023Updated 2 years ago
- Bro/Zeek integration with osquery☆94Nov 2, 2020Updated 5 years ago
- An information security preparedness tool to do adversarial simulation.☆1,142Apr 1, 2019Updated 6 years ago
- Investigate suspicious activity by visualizing Sysmon's event log☆431Dec 22, 2023Updated 2 years ago
- Your Everyday Threat Intelligence☆1,949Updated this week
- A set of Zeek scripts to detect ATT&CK techniques.☆620Jun 26, 2024Updated last year
- ☆1,093May 1, 2019Updated 6 years ago
- ☆349Mar 19, 2021Updated 4 years ago
- TheHive is a Collaborative Case Management Platform, now distributed as a commercial version☆3,880Jul 25, 2025Updated 6 months ago
- Malcom - Malware Communications Analyzer☆1,165Nov 29, 2017Updated 8 years ago
- VirusTotal Wanna Be - Now with 100% more Hipster☆1,850Apr 3, 2023Updated 2 years ago
- Detect Tactics, Techniques & Combat Threats☆2,263Jan 21, 2026Updated 3 weeks ago
- Bro IDS + ELK Stack to detect and block data exfiltration☆46Oct 31, 2018Updated 7 years ago
- ☆50Aug 30, 2020Updated 5 years ago
- FAME Automates Malware Evaluation☆926Dec 16, 2025Updated last month
- A repository for using windows event forwarding for incident detection and response☆1,296Sep 8, 2025Updated 5 months ago
- FATT /fingerprintAllTheThings - a pyshark based script for extracting network metadata and fingerprints from pcap files and live network …☆679Oct 28, 2023Updated 2 years ago
- Scirius is a web application for Suricata ruleset management and threat hunting.☆676Dec 23, 2025Updated last month
- Actionable analytics designed to combat threats☆1,006May 25, 2022Updated 3 years ago
- Zeek Analysis Tools (ZAT): Processing and analysis of Zeek network data with Pandas, scikit-learn, Kafka and Spark☆451Jan 16, 2024Updated 2 years ago
- The Hunting ELK☆3,913Jun 1, 2024Updated last year
- Test Blue Team detections without running any attack.☆272May 2, 2024Updated last year
- A Powershell incident response framework☆1,637Nov 22, 2022Updated 3 years ago
- A Python library to help with some common threat hunting data analysis operations☆143Apr 23, 2023Updated 2 years ago