brimdata / brimcap
Convert pcap files into richly-typed ZNG summary logs (Zeek, Suricata, and more)
☆81Updated 2 weeks ago
Alternatives and similar repositories for brimcap:
Users that are interested in brimcap are comparing it to the libraries listed below
- Open source endpoint agent providing host information to Zeek. [v2]☆80Updated this week
- PcapMonkey will provide an easy way to analyze pcap using the latest version of Suricata and Zeek.☆153Updated last month
- Suricata rules for network anomaly detection☆160Updated 3 weeks ago
- Suricata Language Server is an implementation of the Language Server Protocol for Suricata signatures. It adds syntax check, hints and au…☆70Updated 3 weeks ago
- simple YARA-based IOC scanner☆169Updated 2 months ago
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆95Updated 3 years ago
- ☆43Updated 2 years ago
- Look into EDR events from network☆23Updated this week
- Mapping NSM rules to MITRE ATT&CK☆71Updated 4 years ago
- Anything Sysmon related from the MSTIC R&D team☆153Updated 11 months ago
- ☆95Updated 3 years ago
- Cisco Orbital - Osquery queries by Talos☆132Updated 8 months ago
- IoT and Operational Technology Honeypot☆105Updated last year
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆65Updated last year
- Pathfinder is a plugin for mapping network vulnerabilities, scanned by CALDERA or imported by a supported network scanner, and translatin…☆126Updated last month
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆35Updated 2 years ago
- Collection of various open-source an commercial rulesets for NIDS (especially for Suricata and Snort)☆26Updated last year
- Blueteam operational triage registry hunting/forensic tool.☆145Updated last year
- 🚨ATTENTION🚨 The VERIS mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here …☆71Updated last year
- ☆38Updated 6 months ago
- A Self-Contained Open-Source Cyberattack Experimentation Testbed☆40Updated 2 months ago
- Active C2 IoCs☆99Updated 2 years ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆106Updated 2 years ago
- ☆53Updated this week
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆140Updated 2 months ago
- Zeek IDS Dockerfile☆101Updated 2 years ago
- Tool to discover external and internal network attack surface☆196Updated 11 months ago
- Evtx to Splunk ingestor☆15Updated 3 years ago
- go-atomicredteam is a Golang application to execute tests as defined in the atomics folder of Red Canary's Atomic Red Team project (https…☆49Updated 2 years ago
- The Security Analyst’s Guide to Suricata☆55Updated last week