corelight / conn-burst
A Bro package to identify connections that are bursting (lots of data and transferring quickly).
☆13Updated 4 years ago
Alternatives and similar repositories for conn-burst:
Users that are interested in conn-burst are comparing it to the libraries listed below
- Zeek support for Community ID flow hashing.☆35Updated last year
- ☆23Updated 4 years ago
- Bro IDS + ELK Stack to detect and block data exfiltration☆46Updated 6 years ago
- Zeek plugin to generate data on per-packet sizes and intervals☆14Updated 4 years ago
- Bro script package to create JSON formatted logs to stream into data analysis systems.☆28Updated last year
- scan-detection policies for bro☆15Updated 2 months ago
- brocon-15 scripts☆13Updated 7 years ago
- Zeek package to detect Zerologon☆11Updated 3 years ago
- ☆9Updated 5 years ago
- Extensions for Zeek's Intelligence Framework.☆11Updated 3 years ago
- Specifications used in the MISP project including MISP core format☆51Updated 2 months ago
- Enables Zeek to communicate with Tenzir☆11Updated last year
- Plugin providing native AF_Packet support for Zeek.☆34Updated 11 months ago
- Flow-Indexer indexes flows found in chunked log files from bro,nfdump,syslog, or pcap files☆44Updated 10 months ago
- Integrate Zeek with Alienvault OTX☆25Updated 4 years ago
- ☆14Updated 11 months ago
- Bro/Zeek integration with osquery☆94Updated 4 years ago
- Bro Intel Feed Linter☆26Updated 5 years ago
- Collection of bro scripts☆9Updated 9 years ago
- Top DNS Measurement for Bro☆11Updated 4 years ago
- Plugin for Zeek/Bro which provides http2 decoder/analyzer☆31Updated 9 months ago
- Python script that gets IOC from MISP and converts it into BRO intel files.☆13Updated 8 years ago
- Broctl plugin for automatically executing 'setcap' on each node after an install☆13Updated 4 years ago
- Bro-IDS scripts☆50Updated 8 years ago
- Utilizing your Threat data from a MISP instance into CarbonBlack Response by exposing the data in the Threat Intelligence Feed.☆19Updated 2 years ago
- Zeek package for tracking long connections to report them before they have completed.☆30Updated last month
- Extracting and analyzing URLs from Emails for phishing events☆21Updated 4 years ago
- Detect Phishing with Bro IDS☆18Updated 8 years ago
- ☆33Updated 4 years ago
- Threat Intelligence distribution☆30Updated 9 years ago