cedricbonhomme / pyHIDSLinks
A HIDS (host-based intrusion detection system) for verifying the integrity of a system.
☆60Updated this week
Alternatives and similar repositories for pyHIDS
Users that are interested in pyHIDS are comparing it to the libraries listed below
Sorting:
- Client API to query any Passive DNS implementation following the Passive DNS - Common Output Format.☆82Updated last month
- A web-based tool to assist the work of the intuitive threat analysts.☆114Updated 6 years ago
- How to Zeek Sysmon Logs!☆103Updated 3 years ago
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆103Updated 6 months ago
- JoeSandbox-Bro is a simple bro script which extracts files from your internet connection and analyzes them automatically on Joe Sandbox☆45Updated 6 years ago
- Scripts to detect Fast-Flux and DGA using DNS query responses☆44Updated 8 years ago
- collector/runner☆64Updated 4 months ago
- Passive DNS collection using Zeek☆182Updated 2 years ago
- Last download from git://git.carnivore.it/honeytrap.git of Honytrap by Tillmann Werner☆44Updated 4 years ago
- Web service for scanning pcaps with snort☆110Updated 7 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 5 years ago
- Malware/IOC ingestion and processing engine☆108Updated 7 years ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆71Updated 6 years ago
- Minimal, consistent Python API for building integrations with malware sandboxes.☆140Updated last year
- ☆35Updated 2 years ago
- PcapMonkey will provide an easy way to analyze pcap using the latest version of Suricata and Zeek.☆161Updated 9 months ago
- Simple High Interaction Honeypot Solution for SMB protocol☆50Updated 4 years ago
- This repository will hold PCAP IOC data related with known malware samples (owner: Bryant Smith)☆108Updated 4 years ago
- Mapping NSM rules to MITRE ATT&CK☆73Updated 5 years ago
- A low interaction honeypot for the Cisco ASA component capable of detecting CVE-2018-0101, a DoS and remote code execution vulnerability.☆57Updated 7 years ago
- a network packet capture compiler☆205Updated 3 years ago
- The Fastest way to consume Threat Intel☆26Updated 3 years ago
- brostash: Linux distribution based on Debian and focusing on network security events collection☆33Updated 5 years ago
- Useful resources for Zeek(https://zeek.org/) (Bro(http://bro.org/))☆31Updated 5 years ago
- Templates for Kibana/Logstash to use with Suricata IDPS☆81Updated 9 years ago
- Python abstract API for PassiveTotal services in the form of libraries and command line utilities.☆86Updated 2 years ago
- Passive DNS V2☆60Updated 11 years ago
- Rule sets for Sagan☆106Updated 5 years ago
- The stratosphere testing framework is mean to help in the researching and verification of the behavioral models used by the Stratoshpere …☆50Updated 7 years ago
- Vulnerability Data in ES☆143Updated 8 years ago