brimdata / brimcapLinks
Convert pcap files into richly-typed ZNG summary logs (Zeek, Suricata, and more)
☆91Updated 7 months ago
Alternatives and similar repositories for brimcap
Users that are interested in brimcap are comparing it to the libraries listed below
Sorting:
- Open source endpoint agent providing host information to Zeek. [v2]☆89Updated last week
- PcapMonkey will provide an easy way to analyze pcap using the latest version of Suricata and Zeek.☆159Updated 8 months ago
- Suricata rules for network anomaly detection☆176Updated last week
- Suricata Language Server is an implementation of the Language Server Protocol for Suricata signatures. It adds syntax check, hints and au…☆83Updated this week
- simple YARA-based IOC scanner☆171Updated 2 weeks ago
- Cisco Orbital - Osquery queries by Talos☆135Updated last year
- ☆45Updated 3 years ago
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆38Updated 3 years ago
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆67Updated last year
- Entropy scanner for Linux to detect packed or encrypted binaries related to malware. Finds malicious files and Linux processes and gives …☆167Updated last year
- ☆60Updated this week
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆141Updated 9 months ago
- Collection of various open-source an commercial rulesets for NIDS (especially for Suricata and Snort)☆29Updated 2 years ago
- BGP ranking is a free software to calculate the security ranking of Internet Service Provider (ASN)☆75Updated 2 months ago
- An open-source, real-time Security Information & Event Management tool based on big data technologies, providing a scalable, advanced sec…☆207Updated 8 months ago
- Suricata Verification Tests - Testing Suricata Output☆117Updated this week
- IoT and Operational Technology Honeypot☆106Updated 2 years ago
- YaraScanner is a file pattern-matching tool based on YARA rules.☆59Updated 2 years ago
- Pathfinder is a plugin for mapping network vulnerabilities, scanned by CALDERA or imported by a supported network scanner, and translatin…☆126Updated 8 months ago
- OASIS Cyber Threat Intelligence (CTI) TC: A repository for commonly used STIX objects in order to avoid needless duplication. https://gi…☆97Updated 6 months ago
- The Security Analyst’s Guide to Suricata☆60Updated 7 months ago
- Incident Response - Fast suspicious file finder☆247Updated 3 years ago
- Sightings Ecosystem gives cyber defenders visibility into what adversaries actually do in the wild. With your help, we are tracking MITRE…☆37Updated 6 months ago
- Suricata rule and intel index☆33Updated 3 weeks ago
- Sagan is a multi-threads, high performance log analysis engine. At it's core, Sagan similar to Suricata/Snort but with logs rather th…☆189Updated last month
- Live forensic artifacts collector☆173Updated last year
- A lightweight tool to score network traffic and flag anomalies☆123Updated last year
- ☆55Updated 3 years ago
- IOCs published by Black Lotus Labs☆124Updated last month
- Pure python parser for Snort/Suricata rules.☆33Updated last year