certego / PcapMonkeyLinks
PcapMonkey will provide an easy way to analyze pcap using the latest version of Suricata and Zeek.
☆158Updated 6 months ago
Alternatives and similar repositories for PcapMonkey
Users that are interested in PcapMonkey are comparing it to the libraries listed below
Sorting:
- simple YARA-based IOC scanner☆169Updated 2 weeks ago
- Suricata Language Server is an implementation of the Language Server Protocol for Suricata signatures. It adds syntax check, hints and au…☆79Updated last week
- S2AN - Mapper of Sigma/Suricata Rules/Signatures ➡️ MITRE ATT&CK Navigator☆88Updated 2 years ago
- Suricata rules for network anomaly detection☆174Updated this week
- 🚌 Threat Bus – A threat intelligence dissemination layer for open-source security tools.☆264Updated 2 years ago
- ☆78Updated 5 years ago
- This script scans the files extracted by Zeek with YARA rules located on the rules folder on a Linux based Zeek sensor, if there is a mat…☆62Updated last year
- ☆44Updated 2 years ago
- This tool maps a file's behavior on MITRE ATT&CK matrix.☆59Updated 5 years ago
- Mapping NSM rules to MITRE ATT&CK☆72Updated 5 years ago
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆37Updated 3 years ago
- Dovehawk is a Zeek module that automatically imports MISP indicators and reports Sightings☆122Updated 4 years ago
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆103Updated 3 months ago
- SIGMA UI is a free open-source application based on the Elastic stack and Sigma Converter (sigmac)☆189Updated 4 years ago
- A Sigma to Wazuh / OSSEC converter including a generated Windows Sysmon ruleset☆34Updated 5 years ago
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆141Updated 8 months ago
- attack2jira automates the process of standing up a Jira environment that can be used to track and measure ATT&CK coverage☆114Updated 2 years ago
- ☆53Updated 6 years ago
- Place for resources used during the Mordor Detection hackathon event featuring APT29 ATT&CK evals datasets☆140Updated 5 years ago
- Import specific data sources into the Sigma generic and open signature format.☆78Updated 3 years ago
- A Ruleset to enhance detection capabilities of Ossec using Sysmon☆94Updated 3 years ago
- How to Zeek Sysmon Logs!☆102Updated 3 years ago
- Live forensic artifacts collector☆172Updated last year
- A CALDERA plugin for ATT&CK Evaluations Round 1☆33Updated 2 years ago
- Snorpy is a python script the gives a Gui interface to help those new to snort create rules.☆63Updated last year
- A honeypot for the Log4Shell vulnerability (CVE-2021-44228).☆91Updated 10 months ago
- ☆53Updated 3 years ago
- PatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform☆149Updated 3 years ago
- Log Entry to Sigma Rule Converter☆109Updated 3 years ago
- A CALDERA plugin☆79Updated last week