bammv / sguil
Sguil client for NSM
☆218Updated last year
Alternatives and similar repositories for sguil
Users that are interested in sguil are comparing it to the libraries listed below
Sorting:
- A Simple QUEry and Report Tool☆142Updated 5 years ago
- CIF v3 -- the fastest way to consume threat intelligence☆182Updated 2 years ago
- The OTX Suricata Rule Generator can be used to create the rules and configuration for Suricata to alert on indicators from your OTX accou…☆110Updated last year
- Sandia Cyber Omni Tracker (SCOT)☆246Updated 6 months ago
- Passive Real-time Asset Detection System☆237Updated 11 months ago
- Alienvault ossim☆123Updated 3 months ago
- Suricata Extreme Performance Tuning guide☆208Updated 7 years ago
- Automated deployment scripts for the RockNSM network hunting distribution.☆453Updated last year
- ** README ** This repo has MOVED to https://github.com/quadrantsec/sagan☆228Updated 4 years ago
- a network packet capture compiler☆199Updated 3 years ago
- Evolving directions on building the best Open Source Forensics VM☆160Updated 6 years ago
- Pulled Pork for Snort and Suricata rule management (from Google code)☆435Updated 3 years ago
- Barnyard2 is a dedicated spooler for Snort's unified2 binary output format.☆353Updated last year
- QRadio ~ Best Threat Intelligence Radio ~ Tune In!☆96Updated 8 years ago
- File Scanning Framework☆292Updated 3 years ago
- DPS' Lightweight Investigation Notebook☆430Updated last year
- ☆168Updated 3 years ago
- ☆203Updated 2 years ago
- Web service for scanning pcaps with snort☆109Updated 6 years ago
- ☆141Updated 11 months ago
- Honeynet Project generic authenticated datafeed protocol☆214Updated last year
- DEPRECATED - USE v3 (bearded-avenger)☆228Updated 7 years ago
- Dovehawk is a Zeek module that automatically imports MISP indicators and reports Sightings☆122Updated 3 years ago
- Threat Feed Aggregation, Made Easy☆168Updated 4 years ago
- Threat Analysis, Reconnaissance, and Data Intelligence System☆125Updated 9 years ago
- Graylog Processing Pipeline functions to enrich log messages with IoC information from threat intelligence databases☆153Updated last year
- The default package source of the Zeek Package Manager. Wrote a package? See the README for how to get it included.☆137Updated 2 weeks ago
- A live dashboard for a real-time overview of threat intelligence from MISP instances☆202Updated last year
- Honeypot Intelligence with Splunk☆254Updated 6 years ago
- The Phishing Intelligence Engine - An Active Defense PowerShell Framework for Phishing Defense with Office 365☆180Updated 5 years ago