Cyber Defence Monitoring Course Suite :: Suricata, Arkime (and others in the past)
☆108Jun 6, 2024Updated last year
Alternatives and similar repositories for CDMCS
Users that are interested in CDMCS are comparing it to the libraries listed below
Sorting:
- You're busted!☆27Dec 16, 2019Updated 6 years ago
- Cyber Defence Monitoring Course Suite :: Suricata, Bro, Moloch☆61Feb 20, 2017Updated 9 years ago
- An Ansible playbook for deploying the Suricata intrusion detection system and fetching Snort rules with Oinkmaster.☆17Oct 30, 2021Updated 4 years ago
- Meer is a "spooler" for Suricata / Sagan.☆30Jun 21, 2023Updated 2 years ago
- Community-based CybergON-powered Suricata rules☆12Jul 5, 2022Updated 3 years ago
- Busted. With duct tape, spit and tears. Brought to you by beer.☆12Nov 4, 2021Updated 4 years ago
- ☆12Apr 23, 2020Updated 5 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Apr 18, 2020Updated 5 years ago
- Mass Suricata rules creator, from a list of domain☆14Sep 14, 2018Updated 7 years ago
- ☆17Sep 9, 2020Updated 5 years ago
- S4A main repository. SaltStack states, install script and build scripts☆27Updated this week
- Expandable Defensive Cyber Operations Platform☆44Sep 28, 2022Updated 3 years ago
- Suricata rules for network anomaly detection☆184Feb 7, 2026Updated 3 weeks ago
- Applies DISA STIGS GPO Policy's offline☆20Jul 30, 2019Updated 6 years ago
- A community event for security researchers to share their favorite notebooks☆108Feb 15, 2024Updated 2 years ago
- A curated list of FOSS software appliances for building a SOC☆18Jan 11, 2021Updated 5 years ago
- Suricata LUA scripts to detect CVE-2019-12255, CVE-2019-12256, CVE-2019-12258, and CVE-2019-12260☆19Nov 28, 2019Updated 6 years ago
- ☆35Dec 9, 2023Updated 2 years ago
- Scirius is a web application for Suricata ruleset management and threat hunting.☆673Dec 23, 2025Updated 2 months ago
- server for indexing and querying passive DNS observations☆50Jan 12, 2026Updated last month
- Kibana 4 Templates for Suricata IDPS☆33Jul 28, 2016Updated 9 years ago
- Suricata Extreme Performance Tuning guide☆213Mar 15, 2018Updated 7 years ago
- Kibana 6 Templates for Suricata IDPS Threat Hunting☆24Mar 5, 2019Updated 6 years ago
- suricata rules to pcap☆10Mar 25, 2021Updated 4 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Sep 17, 2019Updated 6 years ago
- Configuration files for the SOF-ELK VM☆1,719Jan 21, 2026Updated last month
- gonids is a library to parse IDS rules, with a focus primarily on Suricata rule compatibility. There is a discussion forum available that…☆192Jul 18, 2025Updated 7 months ago
- Scripts used for phishing campaigns☆14Aug 18, 2014Updated 11 years ago
- This script and accompanying files will allow system administrators to automatically deploy Microsoft Local Administrator Password Soluti…☆13Aug 18, 2017Updated 8 years ago
- ☆13Feb 25, 2021Updated 5 years ago
- Zenected Threat Defense VPN☆13Apr 28, 2017Updated 8 years ago
- Parse Suricata rules☆13Aug 1, 2023Updated 2 years ago
- Virtual laboratory☆10Mar 19, 2024Updated last year
- Bro analyzer that detects Google's QUIC protocol☆10Mar 2, 2021Updated 4 years ago
- GQUIC Protocol Analyzer for Zeek (Bro) Network Security Monitor☆80Sep 13, 2023Updated 2 years ago
- Quickly generate suricata rules for IOCs☆28Apr 30, 2021Updated 4 years ago
- fast, extensible, versatile event router for Suricata's EVE-JSON format☆57Nov 20, 2025Updated 3 months ago
- This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attac…☆33Apr 15, 2021Updated 4 years ago
- ☆12Jan 28, 2020Updated 6 years ago