certego / PcapMonkey
PcapMonkey will provide an easy way to analyze pcap using the latest version of Suricata and Zeek.
☆151Updated last year
Alternatives and similar repositories for PcapMonkey:
Users that are interested in PcapMonkey are comparing it to the libraries listed below
- simple YARA-based IOC scanner☆168Updated last month
- Suricata Language Server is an implementation of the Language Server Protocol for Suricata signatures. It adds syntax check, hints and au…☆68Updated last month
- Dovehawk is a Zeek module that automatically imports MISP indicators and reports Sightings☆123Updated 3 years ago
- S2AN - Mapper of Sigma/Suricata Rules/Signatures ➡️ MITRE ATT&CK Navigator☆85Updated 2 years ago
- Mapping NSM rules to MITRE ATT&CK☆70Updated 4 years ago
- ☆78Updated 4 years ago
- This script scans the files extracted by Zeek with YARA rules located on the rules folder on a Linux based Zeek sensor, if there is a mat…☆61Updated last year
- This repository will hold PCAP IOC data related with known malware samples (owner: Bryant Smith)☆100Updated 3 years ago
- Suricata rules for network anomaly detection☆156Updated 3 weeks ago
- SIGMA UI is a free open-source application based on the Elastic stack and Sigma Converter (sigmac)☆185Updated 3 years ago
- 🚌 Threat Bus – A threat intelligence dissemination layer for open-source security tools.☆262Updated last year
- Import specific data sources into the Sigma generic and open signature format.☆77Updated 2 years ago
- zeek-scripts☆43Updated 6 years ago
- A website and framework for testing NIDS detection☆57Updated 3 years ago
- How to Zeek Sysmon Logs!☆102Updated 3 years ago
- A tool to assess data quality, built on top of the awesome OSSEM.☆76Updated 2 years ago
- PatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform☆148Updated 2 years ago
- Sigma Detection Rule Repository☆87Updated 4 years ago
- Log Entry to Sigma Rule Converter☆107Updated 3 years ago
- Collecting & Hunting for IOCs with gusto and style☆237Updated 3 years ago
- Automatically create YARA rules from malicious documents.☆210Updated 2 years ago
- The OTX Suricata Rule Generator can be used to create the rules and configuration for Suricata to alert on indicators from your OTX accou…☆108Updated 10 months ago
- This program exports MITRE ATT&CK framework in ELK dashboard☆78Updated 2 years ago
- ☆41Updated 2 years ago
- Personal compilation of APT malware from whitepaper releases, documents and own research☆259Updated 6 years ago
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆98Updated last month
- SIEGMA - Transform Sigma rules into SIEM consumables☆149Updated this week
- Website crawler with YARA detection☆88Updated last year
- A Splunk App containing Sigma detection rules, which can be updated from a Git repository.☆108Updated 5 years ago
- This project is no longer maintained. There's a successor at https://github.com/zeek/zeek-agent-v2☆123Updated 4 years ago