☆13Feb 25, 2021Updated 5 years ago
Alternatives and similar repositories for suricata_open
Users that are interested in suricata_open are comparing it to the libraries listed below
Sorting:
- A simple way of detecting multithreaded exfiltration in Zeek.☆15May 1, 2025Updated 10 months ago
- Ansible role to install auditbeat for security monitoring. (Ruleset included)☆15Nov 16, 2023Updated 2 years ago
- 数据库敏感信息扫描☆12Feb 18, 2021Updated 5 years ago
- 0DayList☆15Apr 4, 2022Updated 3 years ago
- 一个可以扩展的github源码监控系统☆18Aug 28, 2019Updated 6 years ago
- Suricata LUA scripts to detect CVE-2019-12255, CVE-2019-12256, CVE-2019-12258, and CVE-2019-12260☆19Nov 28, 2019Updated 6 years ago
- Threat Intelligence with Elastic - Minemeld integration with Elasticsearch☆19May 11, 2021Updated 4 years ago
- ☆24Mar 19, 2020Updated 5 years ago
- Parse wazuh[HIDS] alerts into ECS mapping using Filebeat☆27Jul 21, 2020Updated 5 years ago
- Analysis of HTTP traffic and detection of anomalous user behavior in allowed actions. UEBA system.☆25Feb 15, 2023Updated 3 years ago
- Quickly generate suricata rules for IOCs☆28Apr 30, 2021Updated 4 years ago
- windows-kernel-exploits Windows平台提权漏洞集合☆27Jan 8, 2018Updated 8 years ago
- 一个基于openresty开发的安全网关demo☆30Mar 3, 2022Updated 4 years ago
- A document tagging library☆33Mar 27, 2025Updated 11 months ago
- This is a repository that is meant to hold detections for various process injection techniques.☆34Mar 3, 2020Updated 6 years ago
- Triaging Windows event logs based on SANS Poster☆47Nov 22, 2025Updated 3 months ago
- Offensive security framework combining 70+ tools for network reconnaissance, OSINT, WiFi attacks, credential cracking, exploitation & tra…☆22Jan 3, 2026Updated 2 months ago
- 安全狗sql注入绕过☆29Mar 21, 2018Updated 7 years ago
- [READ ONLY] Subtree split of the siyuan-packages-monorepo (see https://github.com/Zuoqiu-Yingyi/siyuan-packages-monorepo)☆12Jan 23, 2024Updated 2 years ago
- StreamlitとLangGraphで実装したHuman-in-the-loop広告コピー文生成アプリケーション☆11Feb 15, 2025Updated last year
- Mitre ATT&CK and Suricata Rules Automation with AI & LLM☆14Sep 28, 2024Updated last year
- Automation of some MAPT activities and interaction with the mobile Android device.☆22Sep 28, 2025Updated 5 months ago
- Zeek Training Materials/Products☆41Feb 2, 2026Updated last month
- Repository of creating different example suricata data sets☆37Jan 2, 2019Updated 7 years ago
- ☆35Dec 9, 2023Updated 2 years ago
- Suricata安装部署&丢包优化&性能调优&规则调整&Pfring设置☆143Oct 14, 2019Updated 6 years ago
- Put All Mirror in ONE☆12Feb 18, 2026Updated 2 weeks ago
- Extracts SNIs from a pcap and generates output usable in `etc/hosts` file and Burp config for proxying non-proxy-aware thick clients usin…☆12Jun 23, 2020Updated 5 years ago
- AIM - The open-source NHI platform for AI agents. Cryptographic identity, governance, and access control.☆35Updated this week
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆39Aug 18, 2022Updated 3 years ago
- ⚡ Developer-friendly hybrid-RAG toolkit merging Graphiti, Qdrant, mem0, LlamaIndex, and LangChain into one powerful engine.☆15Jan 14, 2026Updated last month
- bind+mysql☆10Jan 6, 2017Updated 9 years ago
- Pockr Asset Management 破壳资产管理工具☆11Dec 8, 2022Updated 3 years ago
- MinIO nodes for n8n☆11Feb 2, 2026Updated last month
- ☆11Dec 5, 2022Updated 3 years ago
- Suricata rules for network anomaly detection☆184Feb 7, 2026Updated 3 weeks ago
- Ansible playbook for installing MineMeld on Linux☆47Mar 18, 2021Updated 4 years ago
- Plaform independent reverse shell over https☆11Mar 2, 2020Updated 6 years ago
- ☆28Updated this week