** README ** This repo has MOVED to https://github.com/quadrantsec/sagan
☆229Feb 9, 2021Updated 5 years ago
Alternatives and similar repositories for sagan
Users that are interested in sagan are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Rule sets for Sagan☆106Jan 7, 2021Updated 5 years ago
- Scirius is a web application for Suricata ruleset management and threat hunting.☆675Dec 23, 2025Updated 3 months ago
- Web Based Event Viewer (GUI) for Suricata EVE Events in Elastic Search☆485Updated this week
- Suricata Extreme Performance Tuning guide☆213Mar 15, 2018Updated 8 years ago
- Scripts used to create ISO installers of ROCK for offline installation.☆10Mar 13, 2023Updated 3 years ago
- An open standard for hashing network flows into identifiers, a.k.a "Community IDs".☆194Sep 23, 2024Updated last year
- Collect, Process, and Hunt with host based data from MacOS, Windows, and Linux☆506Oct 21, 2022Updated 3 years ago
- Security Onion 16.04 - Linux distro for threat hunting, enterprise security monitoring, and log management☆3,106Apr 16, 2021Updated 4 years ago
- How to Zeek Sysmon Logs!☆103Feb 12, 2022Updated 4 years ago
- Time-Machine Dynamic Bulk Packet Recorder☆36Apr 21, 2025Updated 11 months ago
- Security event correlation engine for ELK stack☆447Jun 26, 2024Updated last year
- Enterprise Log Search and Archive☆211Dec 22, 2018Updated 7 years ago
- Bro Intel Feed Linter☆26Aug 30, 2019Updated 6 years ago
- Pulled Pork for Snort and Suricata rule management (from Google code)☆441Jul 7, 2021Updated 4 years ago
- Bro scripts for the ROCK platform. http://rocknsm.io☆34Jul 2, 2023Updated 2 years ago
- Security information and event management, masters's diploma☆10Aug 3, 2015Updated 10 years ago
- Protocol Analysis/Decoder Framework☆497Dec 19, 2022Updated 3 years ago
- Fast Incident Response☆1,999Mar 5, 2026Updated 2 weeks ago
- Attack Detection☆1,360Aug 31, 2022Updated 3 years ago
- An open source framework for enterprise level automated analysis.☆394Jun 27, 2022Updated 3 years ago
- LogRM is a post exploitation powershell script which it uses windows event logs to gather information about internal network☆74Jul 9, 2019Updated 6 years ago
- A Simple QUEry and Report Tool☆142Sep 17, 2019Updated 6 years ago
- Rekall Forensics and Incident Response Framework with rVMI extensions☆33Mar 25, 2021Updated 4 years ago
- idstools: Snort and Suricata Rule and Event Utilities in Python (Including a Rule Update Tool)☆284Jul 10, 2025Updated 8 months ago
- Community-based CybergON-powered Suricata rules☆12Jul 5, 2022Updated 3 years ago
- Bro/Zeek integration with osquery☆93Nov 2, 2020Updated 5 years ago
- Docker based Suricata, Elasticsearch, Logstash, Kibana, Scirius aka SELKS☆184Sep 13, 2022Updated 3 years ago
- Compare multiple log formats against malware reputation lists.☆88Jul 27, 2017Updated 8 years ago
- Things to know when DFIR occurs near a vault deployment.☆44May 21, 2018Updated 7 years ago
- Bro IDS Dockerfile☆129Sep 14, 2019Updated 6 years ago
- Your Everyday Threat Intelligence☆1,959Mar 16, 2026Updated last week
- Ruby On Rails Application For Network Security Monitoring☆1,009Jun 6, 2023Updated 2 years ago
- An analytical framework for network traffic and behavioral analytics☆455Dec 7, 2022Updated 3 years ago
- Yara is awesome, but sometimes you need to manipulate the data streams you're scanning in different ways.☆98Oct 21, 2014Updated 11 years ago
- Mapping NSM rules to MITRE ATT&CK☆73Aug 29, 2020Updated 5 years ago
- Automated deployment scripts for the RockNSM network hunting distribution.☆456Jul 2, 2023Updated 2 years ago
- ☆50Aug 30, 2020Updated 5 years ago
- Threat Alert Logic Repository☆93Feb 7, 2019Updated 7 years ago
- Modular file scanning/analysis framework☆622Oct 8, 2019Updated 6 years ago