brimdata / brimcap
Convert pcap files into richly-typed ZNG summary logs (Zeek, Suricata, and more)
☆78Updated last month
Related projects ⓘ
Alternatives and complementary repositories for brimcap
- Open source endpoint agent providing host information to Zeek. [v2]☆66Updated last month
- PcapMonkey will provide an easy way to analyze pcap using the latest version of Suricata and Zeek.☆144Updated 8 months ago
- ☆42Updated last year
- Suricata Language Server is an implementation of the Language Server Protocol for Suricata signatures. It adds syntax check, hints and au…☆64Updated last week
- Suricata rules for network anomaly detection☆153Updated 2 months ago
- Suricata Verification Tests - Testing Suricata Output☆102Updated last week
- ☆90Updated 3 years ago
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆93Updated 3 years ago
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆35Updated 2 years ago
- IoT and Operational Technology Honeypot☆105Updated last year
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆60Updated 7 months ago
- tshark + ELK analytics virtual machine☆66Updated 2 years ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆104Updated 2 years ago
- Suricata rule and intel index☆29Updated last month
- go-atomicredteam is a Golang application to execute tests as defined in the atomics folder of Red Canary's Atomic Red Team project (https…☆46Updated last year
- Collection of various open-source an commercial rulesets for NIDS (especially for Suricata and Snort)☆20Updated last year
- simple YARA-based IOC scanner☆164Updated this week
- Cisco Orbital - Osquery queries by Talos☆123Updated 2 months ago
- The Security Analyst’s Guide to Suricata☆52Updated 5 months ago
- OASIS Cyber Threat Intelligence (CTI) TC: A repository for commonly used STIX objects in order to avoid needless duplication. https://gi…☆85Updated this week
- Configuring the Suricata IDS to detect DoS attacks by adding custom rule file.☆39Updated 4 years ago
- Import specific data sources into the Sigma generic and open signature format.☆77Updated 2 years ago
- A Linux Auditd rule set mapped to MITRE's Attack Framework☆89Updated last year
- BGP ranking is a free software to calculate the security ranking of Internet Service Provider (ASN)☆69Updated 4 months ago
- How to Zeek Sysmon Logs!☆101Updated 2 years ago
- ☆47Updated this week
- Growing collection of Spicy-based protocol and file analyzers for Zeek☆31Updated 2 months ago
- ☆46Updated 2 years ago
- Visually inspect and force decode YARA and regex matches found in both binary and text data. With Colors.☆107Updated 7 months ago
- Tool to discover external and internal network attack surface☆192Updated 6 months ago