bammv / sguilLinks
Sguil client for NSM
☆219Updated last year
Alternatives and similar repositories for sguil
Users that are interested in sguil are comparing it to the libraries listed below
Sorting:
- A Simple QUEry and Report Tool☆142Updated 6 years ago
- Barnyard2 is a dedicated spooler for Snort's unified2 binary output format.☆352Updated last year
- Pulled Pork for Snort and Suricata rule management (from Google code)☆439Updated 4 years ago
- Sandia Cyber Omni Tracker (SCOT)☆251Updated 10 months ago
- CIF v3 -- the fastest way to consume threat intelligence☆182Updated 2 years ago
- ☆141Updated last year
- Repo for autosnort scripts.☆157Updated 4 years ago
- Alienvault ossim☆124Updated 7 months ago
- Suricata Extreme Performance Tuning guide☆213Updated 7 years ago
- Passive Real-time Asset Detection System☆246Updated last year
- Snort + Barnyard2 + Pulledpork → The easy way!☆168Updated 4 years ago
- Automated deployment scripts for the RockNSM network hunting distribution.☆456Updated 2 years ago
- Enterprise Log Search and Archive☆210Updated 6 years ago
- ** README ** This repo has MOVED to https://github.com/quadrantsec/sagan☆229Updated 4 years ago
- The OTX Suricata Rule Generator can be used to create the rules and configuration for Suricata to alert on indicators from your OTX accou…☆111Updated last year
- A framework for receiving and redistributing abuse feeds☆124Updated 5 years ago
- Graylog Processing Pipeline functions to enrich log messages with IoC information from threat intelligence databases☆155Updated last year
- Snort FAQ☆118Updated 4 years ago
- OSSEC Documentation☆137Updated 7 months ago
- Evolving directions on building the best Open Source Forensics VM☆161Updated 7 years ago
- The default package source of the Zeek Package Manager. Wrote a package? See the README for how to get it included.☆141Updated 2 weeks ago
- graph visualization tool☆78Updated 9 years ago
- ☆36Updated 4 years ago
- File Scanning Framework☆293Updated 4 years ago
- The Official Github Repository of Daemonlogger☆22Updated 4 years ago
- A tool for analyzing firewall rules☆157Updated 7 years ago
- ☆172Updated 4 years ago
- An SMTP Honeypot☆267Updated 5 months ago
- a network packet capture compiler☆202Updated 3 years ago
- A live dashboard for a real-time overview of threat intelligence from MISP instances☆203Updated 2 years ago