brimdata / brimcapLinks
Convert pcap files into richly-typed ZNG summary logs (Zeek, Suricata, and more)
☆81Updated last month
Alternatives and similar repositories for brimcap
Users that are interested in brimcap are comparing it to the libraries listed below
Sorting:
- Open source endpoint agent providing host information to Zeek. [v2]☆81Updated last week
- PcapMonkey will provide an easy way to analyze pcap using the latest version of Suricata and Zeek.☆153Updated 2 months ago
- Suricata Language Server is an implementation of the Language Server Protocol for Suricata signatures. It adds syntax check, hints and au…☆71Updated 2 weeks ago
- Suricata rules for network anomaly detection☆164Updated last month
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆105Updated 3 years ago
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆141Updated 3 months ago
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆95Updated 3 years ago
- ☆95Updated 3 years ago
- YaraScanner is a file pattern-matching tool based on YARA rules.☆57Updated 2 years ago
- simple YARA-based IOC scanner☆169Updated 3 months ago
- Look into EDR events from network☆23Updated 3 weeks ago
- Mapping NSM rules to MITRE ATT&CK☆71Updated 4 years ago
- Suricata Verification Tests - Testing Suricata Output☆108Updated this week
- Collection of various open-source an commercial rulesets for NIDS (especially for Suricata and Snort)☆26Updated last year
- ☆43Updated 2 years ago
- tshark + ELK analytics virtual machine☆67Updated 4 months ago
- ☆69Updated 3 months ago
- Zeek IDS Dockerfile☆101Updated 2 years ago
- Pathfinder is a plugin for mapping network vulnerabilities, scanned by CALDERA or imported by a supported network scanner, and translatin…☆126Updated last month
- Suricata rule and intel index☆30Updated 2 months ago
- Active C2 IoCs☆99Updated 2 years ago
- S2AN - Mapper of Sigma/Suricata Rules/Signatures ➡️ MITRE ATT&CK Navigator☆86Updated 2 years ago
- The Security Analyst’s Guide to Suricata☆56Updated last month
- IoT and Operational Technology Honeypot☆104Updated last year
- OASIS Cyber Threat Intelligence (CTI) TC: A repository for commonly used STIX objects in order to avoid needless duplication. https://gi…☆93Updated this week
- How to Zeek Sysmon Logs!☆101Updated 3 years ago
- Suricata rules for the new critical vulnerabilities☆82Updated 4 years ago
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆35Updated 2 years ago
- ☆130Updated last year
- Import specific data sources into the Sigma generic and open signature format.☆78Updated 3 years ago