camp0 / aiengineLinks
☆29Updated 8 years ago
Alternatives and similar repositories for aiengine
Users that are interested in aiengine are comparing it to the libraries listed below
Sorting:
- System for network traffic analysis and anomaly detection.☆91Updated 2 months ago
- Passive Real-time Asset Detection System☆246Updated last year
- gonids is a library to parse IDS rules, with a focus primarily on Suricata rule compatibility. There is a discussion forum available that…☆187Updated 2 months ago
- An open standard for hashing network flows into identifiers, a.k.a "Community IDs".☆184Updated last year
- idstools: Snort and Suricata Rule and Event Utilities in Python (Including a Rule Update Tool)☆281Updated 2 months ago
- Web Based Event Viewer (GUI) for Suricata EVE Events in Elastic Search☆469Updated this week
- Suricata, Snort and Zeek IDS rule and pcap testing system☆497Updated last week
- Apache Metron☆60Updated 4 years ago
- Suricata Extreme Performance Tuning guide☆213Updated 7 years ago
- a network packet capture compiler☆202Updated 3 years ago
- Open-source framework to detect outliers in Elasticsearch events☆209Updated 2 years ago
- DGA Domains detection☆67Updated 7 years ago
- virtual honeypots☆382Updated 2 years ago
- Zeek IDS Dockerfile☆101Updated 2 years ago
- A robust, and flexible open source User & Entity Behavior Analytics (UEBA) framework used for Security Analytics. Developed with luv by D…☆451Updated last year
- This project is no longer maintained. There's a successor at https://github.com/zeek/zeek-agent-v2☆123Updated 4 years ago
- ** README ** This repo has MOVED to https://github.com/quadrantsec/sagan☆229Updated 4 years ago
- Generic Low Interaction Honeypot☆287Updated last month
- Rule sets for Sagan☆105Updated 4 years ago
- Zeek Analysis Tools (ZAT): Processing and analysis of Zeek network data with Pandas, scikit-learn, Kafka and Spark☆446Updated last year
- Suricata Extreme Performance Tuning guide - Mark II☆119Updated 7 years ago
- DynamiteNSM is a free Network Security Monitor developed by Dynamite Analytics to enable network visibility and advanced cyber threat det…☆171Updated 2 years ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆81Updated last month
- The repository that contains the algorithms for generating domain names, dictionaries of malicious domain names. Developed to research th…☆219Updated 8 years ago
- ☆173Updated 4 years ago
- LibHTP is a security-aware parser for the HTTP protocol and the related bits and pieces.☆306Updated 2 weeks ago
- The tool for updating your Suricata rules.☆280Updated 2 months ago
- A set of ICS IDS rules for use with Suricata.☆50Updated last year
- Web service for scanning pcaps with snort☆109Updated 7 years ago
- Visualize network topologies and collect graph statistics based on pcap files☆353Updated 2 years ago