conix-security / bl2ru2
Mass Suricata rules creator, from a list of domain
☆14Updated 6 years ago
Alternatives and similar repositories for bl2ru2:
Users that are interested in bl2ru2 are comparing it to the libraries listed below
- Top DNS Measurement for Bro☆11Updated 4 years ago
- Threat Intelligence with Elastic - Minemeld integration with Elasticsearch☆19Updated 3 years ago
- A Yara Lua output script for Suricata☆19Updated 5 years ago
- Bro IDS + ELK Stack to detect and block data exfiltration☆46Updated 6 years ago
- scan-detection policies for bro☆15Updated last month
- Utilizing your Threat data from a MISP instance into CarbonBlack Response by exposing the data in the Threat Intelligence Feed.☆19Updated 2 years ago
- Add POST body excerpt to Bro's HTTP log☆14Updated 9 months ago
- Meer (GPLv2) is a dedicated "spooler" for the Suricata & Sagan EVE output formats.☆23Updated 4 years ago
- ☆12Updated 4 years ago
- Cyber Threat Intelligence Feeds☆92Updated 8 years ago
- Zeek support for Community ID flow hashing.☆35Updated last year
- Bro PCAP Processing and Tagging API☆28Updated 7 years ago
- Contributed Bro Scripts☆30Updated 10 years ago
- Generates visualizations from the output of flow tools such as SiLK.☆35Updated 8 years ago
- Integrate Zeek with Alienvault OTX☆25Updated 4 years ago
- An Ubuntu 16.04 build containing Suricata, PulledPork, Bro, and Splunk☆23Updated 6 years ago
- brostash: Linux distribution based on Debian and focusing on network security events collection☆34Updated 4 years ago
- A Bro package to identify connections that are bursting (lots of data and transferring quickly).☆13Updated 4 years ago
- Actionable analytics designed to combat threats based on MITRE's ATT&CK.☆22Updated 5 years ago
- Dovehawk is a Zeek module that automatically imports MISP indicators and reports Sightings☆122Updated 3 years ago
- ☆33Updated 4 years ago
- A website and framework for testing NIDS detection☆57Updated 3 years ago
- Porting Suricata to Bro signatures☆6Updated 5 years ago
- Community-based CybergON-powered Suricata rules☆12Updated 2 years ago
- Suricata rule and intel index☆30Updated 2 months ago
- the fastest way to consume threat intelligence.☆29Updated last year
- ☆23Updated 4 years ago
- How to send structured Snort IDS alert logs into Graylog☆27Updated last year
- The Bro/Zeek language cheat sheet☆51Updated 11 years ago
- An informational repo about hunting for adversaries in your IT environment.☆14Updated 7 years ago