corelight / got_zoomLinks
A Zeek package that detects Zoom logins and meeting joins
☆12Updated 5 years ago
Alternatives and similar repositories for got_zoom
Users that are interested in got_zoom are comparing it to the libraries listed below
Sorting:
- Zeek plugin to generate data on per-packet sizes and intervals☆14Updated 5 years ago
- Remote Desktop Client Fingerprint script for Zeek. Based off of https://github.com/0x4D31/fatt☆40Updated 2 years ago
- CyCAT.org API back-end server including crawlers☆29Updated 2 years ago
- Zeek support for Community ID flow hashing.☆36Updated 2 years ago
- Utility for parsing Bro log files into CSV or JSON format☆41Updated 2 years ago
- Threat Detection Rules (Snort/Sigma/Yara)☆14Updated last year
- CyCAT.org taxonomies☆15Updated 4 years ago
- Firepit - STIX Columnar Storage☆16Updated last year
- Create dataset for suricata with indicators of MISP instances and add sightings in MISP if an indicator of dataset generates an alert☆36Updated 2 years ago
- Zeek package to detect Zerologon☆11Updated 3 years ago
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆35Updated 3 years ago
- Growing collection of Spicy-based protocol and file analyzers for Zeek☆31Updated 11 months ago
- Zeek package to generate a SMB client fingerprint☆27Updated 5 years ago
- A Spicy protocol analyzer for WireGuard☆29Updated 5 years ago
- Notes for High Availability MISP in AWS☆19Updated 5 years ago
- ☆15Updated 7 years ago
- ☆13Updated 3 years ago
- Transform EQL detection rules to VQL artifacts☆11Updated 3 years ago
- Web app that provides basic navigation and annotation of ATT&CK matrices☆17Updated 4 years ago
- Specifications used in the MISP project including MISP core format☆51Updated last month
- Elasticsearch/Kibana environment and log data for Sigma workshop☆27Updated 5 years ago
- A Python implementation of the Community ID flow hashing standard☆23Updated last year
- Zeek Extension to Collect Metadata for Profiling of Endpoints and Proxies☆36Updated last year
- A script to create and assign SOP tasks into the cases☆20Updated 5 years ago
- Actionable analytics designed to combat threats based on MITRE's ATT&CK.☆23Updated 6 years ago
- ☆25Updated 2 years ago
- Automatic detection engineering technical state compliance☆55Updated last year
- Bluehat 2018 Graphs for Security Workshop☆42Updated 6 years ago
- SACTI - Securely aggregate CTI sightings and report them on MISP☆14Updated 2 years ago
- Suricata rule and intel index☆31Updated last month