cisco / firepower-ngfw
Firepower Threat Defense Virtual templates and artifacts
☆13Updated 4 years ago
Alternatives and similar repositories for firepower-ngfw:
Users that are interested in firepower-ngfw are comparing it to the libraries listed below
- Build Automated Machine Images for MISP☆28Updated last year
- ☆11Updated 4 years ago
- Some Powershell scripts developed during my security consulting work. Hopefully they are useful to you too!☆13Updated 4 years ago
- Scripts developed for process automation and testing in Sophos firewall.☆23Updated 4 years ago
- ISC Forge is an open source DHCP conformance validation framework, primarily used for testing ISC Kea.☆36Updated this week
- ☆14Updated last month
- D4 core software (server and sample sensor client)☆42Updated last year
- Geppetto - Virtual machine and infrastructure orchestration☆13Updated this week
- This is a script to import Cisco Talos's IP Blacklist into a Tag (Host Group) within Stealthwatch. This will also optionally create a Cu…☆11Updated last year
- Generic Signature Format for SIEM Systems☆14Updated 3 years ago
- Porting Suricata to Bro signatures☆6Updated 5 years ago
- Network visualizer tool built using Processing☆24Updated 3 years ago
- Prototype system to monitor BGP routes and alert when anomalies are identified☆14Updated 6 years ago
- ansible role to setup MISP, Malware Information Sharing Platform & Threat Sharing☆53Updated 2 months ago
- DNS passive monitoring tool☆16Updated 7 years ago
- Collection of configuration files that can be used as good starting points to secure different services and tools☆15Updated last month
- AutoSpamEmailScan.ps1 is used to monitor a specific mailbox that enterprise users can forward suspicious spam emails to a specific mailbo…☆16Updated last year
- netbeacon - monitoring your network capture, NIDS or network analysis process☆19Updated 11 years ago
- Kibana 6 Templates for Suricata IDPS Threat Hunting☆24Updated 5 years ago
- Pep up your Windows Event Collector (WEC) for Windows Event Forwarding (WEF)☆19Updated 3 years ago
- Scan SSL based TCP services, ips, ports and network ranges to obtain certificate expiry data. Get automated alerts about certificates exp…☆29Updated 8 years ago
- The RIPE NCC DNS Monitoring Service (DNSMON) provides a comprehensive, objective and up-to-date overview of the quality of the service of…☆30Updated 7 months ago
- Create machine images containing the Nessus vulnerability scanner☆11Updated 3 weeks ago
- An Ansible playbook for deploying the Suricata intrusion detection system and fetching Snort rules with Oinkmaster.☆15Updated 3 years ago
- Tools for security content automation, baseline tailoring, and overlay development.☆43Updated 5 months ago
- ☆13Updated 3 years ago
- Modular IMAP proxy (including PyCIRCLeanMail and MISP forward modules)☆28Updated 6 years ago
- Application and service identification rules for Suricata☆18Updated 2 years ago
- Manufacturer Usage Description (MUD) is a technique whereby constrained end devices (e.g., IoT devices) can signal to the network what so…☆22Updated 3 years ago
- Public Github Pages for Cisco☆14Updated 6 years ago