conix-security / bl2ru2
Mass Suricata rules creator, from a list of domain
☆14Updated 6 years ago
Alternatives and similar repositories for bl2ru2:
Users that are interested in bl2ru2 are comparing it to the libraries listed below
- brostash: Linux distribution based on Debian and focusing on network security events collection☆34Updated 4 years ago
- Zeek support for Community ID flow hashing.☆35Updated last year
- Threat Intelligence with Elastic - Minemeld integration with Elasticsearch☆19Updated 3 years ago
- Top DNS Measurement for Bro☆11Updated 4 years ago
- Bro IDS + ELK Stack to detect and block data exfiltration☆47Updated 6 years ago
- Wireshark plugin to display Suricata analysis info☆93Updated 3 years ago
- Meer (GPLv2) is a dedicated "spooler" for the Suricata & Sagan EVE output formats.☆23Updated 3 years ago
- JoeSandbox-Bro is a simple bro script which extracts files from your internet connection and analyzes them automatically on Joe Sandbox☆44Updated 5 years ago
- A website and framework for testing NIDS detection☆56Updated 3 years ago
- A Yara Lua output script for Suricata☆19Updated 5 years ago
- Imports Alienvault OTX pulses to a MISP instance☆52Updated 3 years ago
- Flow-Indexer indexes flows found in chunked log files from bro,nfdump,syslog, or pcap files☆44Updated 8 months ago
- Web based Manager for Yara Rules☆57Updated 4 years ago
- Suricata rule and intel index☆30Updated last month
- Community-based CybergON-powered Suricata rules☆12Updated 2 years ago
- ☆12Updated 4 years ago
- Plugin providing native AF_Packet support for Zeek.☆34Updated 9 months ago
- Integrate Zeek with Alienvault OTX☆25Updated 4 years ago
- Plugin for Zeek/Bro which provides http2 decoder/analyzer☆30Updated 7 months ago
- The OTX Suricata Rule Generator can be used to create the rules and configuration for Suricata to alert on indicators from your OTX accou…☆108Updated 9 months ago
- setup zeek, previously Bro IDS☆17Updated 2 months ago
- ☆33Updated 4 years ago
- Connect your mail client/infrastructure to MISP in order to create events based on the information contained within mails.☆69Updated last year
- ☆48Updated 4 years ago
- ☆15Updated 7 years ago
- Suricata RPMs for CentOS/RHEL and Fedora☆19Updated 3 months ago
- ☆20Updated 4 years ago
- scan-detection policies for bro☆15Updated 2 weeks ago
- Mapping NSM rules to MITRE ATT&CK☆68Updated 4 years ago
- Actionable analytics designed to combat threats based on MITRE's ATT&CK.☆22Updated 5 years ago