binorassocies / brostashLinks
brostash: Linux distribution based on Debian and focusing on network security events collection
☆34Updated 4 years ago
Alternatives and similar repositories for brostash
Users that are interested in brostash are comparing it to the libraries listed below
Sorting:
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆72Updated 6 years ago
- Scripts for Bro IDS and ELK Stack☆57Updated 9 years ago
- A Docker container for Moloch based on minimal Debian☆26Updated 9 years ago
- Passive DNS V2☆60Updated 11 years ago
- Bro IDS + ELK Stack to detect and block data exfiltration☆46Updated 6 years ago
- Top DNS Measurement for Bro☆11Updated 5 years ago
- scan-detection policies for bro☆16Updated 7 months ago
- JoeSandbox-Bro is a simple bro script which extracts files from your internet connection and analyzes them automatically on Joe Sandbox☆45Updated 6 years ago
- A Docker container for Moloch based on minimal Debian☆13Updated 8 years ago
- An Ubuntu 16.04 build containing Suricata, PulledPork, Bro, and Splunk☆23Updated 7 years ago
- bro on debian with elasticsearch support☆24Updated 8 years ago
- ☆22Updated 7 years ago
- A RESTful API frontend for Stenographer☆54Updated 2 years ago
- Malware/IOC ingestion and processing engine☆106Updated 6 years ago
- Detect Phishing with Bro IDS☆19Updated 8 years ago
- Core elements of the Modern Honey Network implemented in Docker☆34Updated 3 years ago
- Various Bro scripts☆97Updated 9 years ago
- Bro scripts to be shared with the community☆111Updated 12 years ago
- Security Onion Elastic Stack☆46Updated 4 years ago
- Network Forensics Bro scripts & pcap samples☆63Updated 11 years ago
- ☆20Updated 5 years ago
- Bro-IDS scripts☆50Updated 8 years ago
- Generates visualizations from the output of flow tools such as SiLK.☆35Updated 8 years ago
- Bro scripts for the ROCK platform. http://rocknsm.io☆34Updated 2 years ago
- Passive Network Audit Framework☆32Updated 7 years ago
- My network monitoring solution and tools that go along with it.☆62Updated 3 years ago
- ☆85Updated 12 years ago
- The Fastest way to consume Threat Intel☆26Updated 3 years ago
- A web-based tool to assist the work of the intuitive threat analysts.☆113Updated 6 years ago
- Honeypot log processor to create OTX Pulse entries☆28Updated last year