certego / PcapMonkeyLinks
PcapMonkey will provide an easy way to analyze pcap using the latest version of Suricata and Zeek.
☆163Updated 10 months ago
Alternatives and similar repositories for PcapMonkey
Users that are interested in PcapMonkey are comparing it to the libraries listed below
Sorting:
- simple YARA-based IOC scanner☆175Updated last month
- S2AN - Mapper of Sigma/Suricata Rules/Signatures ➡️ MITRE ATT&CK Navigator☆91Updated 3 years ago
- Suricata Language Server is an implementation of the Language Server Protocol for Suricata signatures. It adds syntax check, hints and au…☆84Updated last month
- Suricata rules for network anomaly detection☆182Updated 2 months ago
- 🚌 Threat Bus – A threat intelligence dissemination layer for open-source security tools.☆269Updated 2 years ago
- This script scans the files extracted by Zeek with YARA rules located on the rules folder on a Linux based Zeek sensor, if there is a mat…☆62Updated 2 years ago
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆140Updated 11 months ago
- A Sigma to Wazuh / OSSEC converter including a generated Windows Sysmon ruleset☆38Updated 5 years ago
- Mapping NSM rules to MITRE ATT&CK☆73Updated 5 years ago
- ☆44Updated 3 years ago
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆103Updated 7 months ago
- This tool maps a file's behavior on MITRE ATT&CK matrix.☆59Updated 5 years ago
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆38Updated 3 years ago
- Linux Incident Response☆90Updated 6 years ago
- ☆78Updated 5 years ago
- PatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform☆149Updated 3 years ago
- A Ruleset to enhance detection capabilities of Ossec using Sysmon☆95Updated 3 years ago
- Automatically create YARA rules from malicious documents.☆212Updated 3 years ago
- Active C2 IoCs☆99Updated 3 years ago
- SIGMA UI is a free open-source application based on the Elastic stack and Sigma Converter (sigmac)☆189Updated 4 years ago
- Convert pcap files into richly-typed ZNG summary logs (Zeek, Suricata, and more)☆92Updated 9 months ago
- How to Zeek Sysmon Logs!☆103Updated 3 years ago
- Personal compilation of APT malware from whitepaper releases, documents and own research☆266Updated 7 years ago
- ☆53Updated 6 years ago
- Import specific data sources into the Sigma generic and open signature format.☆79Updated 3 years ago
- Place for resources used during the Mordor Detection hackathon event featuring APT29 ATT&CK evals datasets☆145Updated 5 years ago
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆67Updated last year
- This program exports MITRE ATT&CK framework in ELK dashboard☆80Updated 3 years ago
- A tool to assess data quality, built on top of the awesome OSSEM.☆80Updated 3 years ago
- Mindmaps for threat hunting - work in progress.☆152Updated 3 years ago