bammv / sguilView external linksLinks
Sguil client for NSM
☆222Mar 19, 2024Updated last year
Alternatives and similar repositories for sguil
Users that are interested in sguil are comparing it to the libraries listed below
Sorting:
- A Simple QUEry and Report Tool☆142Sep 17, 2019Updated 6 years ago
- Security Onion 16.04 - Linux distro for threat hunting, enterprise security monitoring, and log management☆3,107Apr 16, 2021Updated 4 years ago
- ☆11Oct 21, 2020Updated 5 years ago
- Barnyard2 is a dedicated spooler for Snort's unified2 binary output format.☆352Apr 11, 2024Updated last year
- Example Suricata rules implementing some of my detection tactics☆22Jan 13, 2023Updated 3 years ago
- ☆36Dec 7, 2020Updated 5 years ago
- Parse IE, FireFox, Chrome and Safari Cookies for Google Analytic values☆23Sep 3, 2016Updated 9 years ago
- Enterprise Log Search and Archive☆211Dec 22, 2018Updated 7 years ago
- Scripts for Looking up OUIs or Vendor information from MAC addresses☆11Dec 24, 2023Updated 2 years ago
- Ruby On Rails Application For Network Security Monitoring☆1,009Jun 6, 2023Updated 2 years ago
- Evolving directions on building the best Open Source Forensics VM☆161Jul 5, 2018Updated 7 years ago
- File Scanning Framework☆295Sep 15, 2021Updated 4 years ago
- ☆22Mar 16, 2020Updated 5 years ago
- Pulled Pork for Snort and Suricata rule management (from Google code)☆442Jul 7, 2021Updated 4 years ago
- REST API based malware repository (abandoned)☆107Apr 4, 2015Updated 10 years ago
- Bro IDS programs collection.☆146Oct 16, 2019Updated 6 years ago
- OSSEC is an Open Source Host-based Intrusion Detection System that performs log analysis, file integrity checking, policy monitoring, roo…☆5,025Updated this week
- ☆32Jan 24, 2016Updated 10 years ago
- Bro scripts to be shared with the community☆110Mar 6, 2013Updated 12 years ago
- A collection of demisto tools☆20Dec 29, 2025Updated last month
- The NoSQL Honeypot Framework☆103Oct 17, 2023Updated 2 years ago
- Tool to gather Threat Intelligence indicators from publicly available sources☆658Mar 14, 2019Updated 6 years ago
- Competition Infrastructure Management☆13Oct 16, 2025Updated 3 months ago
- A series of labs that will help users apply various data science techniques to security related data.☆133May 1, 2015Updated 10 years ago
- Fast Incident Response☆1,988Updated this week
- Analysis scripts for the Bro Intrusion Detection System☆59Feb 26, 2014Updated 11 years ago
- Script for generating Bro intel files from pdf or html reports☆77Dec 7, 2015Updated 10 years ago
- Cuckoo Sandbox is an automated dynamic malware analysis system☆5,908May 3, 2022Updated 3 years ago
- Yara syntax highlighting☆25Sep 4, 2021Updated 4 years ago
- Version Releases of Splinter the RAT @Carpenter1010☆32Nov 12, 2014Updated 11 years ago
- Rekall Memory Forensic Framework☆1,998Oct 18, 2020Updated 5 years ago
- A Suricata based NDR distribution☆1,590Sep 13, 2025Updated 5 months ago
- An informational repo about hunting for adversaries in your IT environment.☆1,846Nov 17, 2021Updated 4 years ago
- Protocol Analysis/Decoder Framework☆497Dec 19, 2022Updated 3 years ago
- Zeek is a powerful network analysis framework that is much different from the typical IDS you may know.☆7,463Feb 7, 2026Updated last week
- Threatbutt Suite☆37Jun 3, 2015Updated 10 years ago
- TheHive is a Collaborative Case Management Platform, now distributed as a commercial version☆3,883Jul 25, 2025Updated 6 months ago
- Binary analysis and management framework☆1,557Jun 7, 2023Updated 2 years ago
- ☆196May 23, 2024Updated last year