Corelight@Home script
☆46Oct 5, 2023Updated 2 years ago
Alternatives and similar repositories for raspi-corelight
Users that are interested in raspi-corelight are comparing it to the libraries listed below
Sorting:
- Reviews and tests of security products☆17Dec 28, 2024Updated last year
- ☆14Jan 14, 2026Updated last month
- Enables Zeek to communicate with Tenzir☆11Jul 20, 2023Updated 2 years ago
- A Spicy protocol analyzer for WireGuard☆29Aug 11, 2020Updated 5 years ago
- Zeek plugin to generate data on per-packet sizes and intervals☆14Apr 21, 2020Updated 5 years ago
- Multi-arch SoapySDR container running SoapySDRServer. Suppors RTL-SDR,bladeRF,HackRF,AirSpy,AirSpyHF,LimeSDR,PlutoSDR.☆14Dec 4, 2020Updated 5 years ago
- Corelight-Ansible-Roles are a collection of Ansible Roles and playbooks that install, configure, run and manage a variety of Corelight, S…☆16Jun 15, 2021Updated 4 years ago
- An automated way to send phishing emails from Google/G-suite.☆18Nov 30, 2018Updated 7 years ago
- A walkthrough of creating and using the Azure environment and Microsoft Sentinel to track attacks and plot attacks on a live map.☆23Mar 26, 2023Updated 2 years ago
- Collection of various materials on operational security.☆23Nov 15, 2016Updated 9 years ago
- This is a repository from Adam Swan and I's presentation on Windows Logs Zero 2 Hero.☆22Jan 30, 2018Updated 8 years ago
- Know Your IP: Get location, blacklist status, shodan and censys results, and more.☆21Dec 15, 2025Updated 2 months ago
- An Installation Script for Bro IDS on Debian Based Systems☆20Jun 25, 2020Updated 5 years ago
- Convert pcap files into richly-typed ZNG summary logs (Zeek, Suricata, and more)☆92Apr 25, 2025Updated 10 months ago
- S2AN - Mapper of Sigma/Suricata Rules/Signatures ➡️ MITRE ATT&CK Navigator☆91Dec 8, 2022Updated 3 years ago
- SOC Workflow App helps Security Analysts and Threat Hunters explore suspicious events, look into raw events arriving at the Elastic Stack…☆94Aug 30, 2022Updated 3 years ago
- This Repository gives the best and possible strategies against hunting the ransomware☆26Aug 23, 2022Updated 3 years ago
- Incident Response Network Tools☆24Jul 23, 2021Updated 4 years ago
- Hackable Windows SandBox environment☆32Apr 20, 2023Updated 2 years ago
- A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the…☆62Nov 26, 2025Updated 3 months ago
- How to send structured Snort IDS alert logs into Graylog☆27Oct 20, 2025Updated 4 months ago
- The FASTEST way to consume threat intel.☆69May 10, 2023Updated 2 years ago
- A Splunk Technology Add-on to forward filtered ETW events.☆30Oct 14, 2020Updated 5 years ago
- Threatfox Censys is a tool to query Censys Search for IP addresses and domains and then parses the JSON and submits the results to Threat…☆36Jan 8, 2026Updated last month
- Tools to rapidly deploy a threat hunting capability on Azure Sentinel that leverages Sysmon and MITRE ATT&CK☆1,078Nov 28, 2024Updated last year
- All the IOC's I have gathered which are used directly involved coronavirus / covid-19 / SARS-CoV-2 cyber attack campaigns☆65Apr 11, 2021Updated 4 years ago
- Data Driven Threat Hunting on the RaspberryPi☆32Jan 26, 2022Updated 4 years ago
- Generate network maps from packet captures☆30Sep 15, 2019Updated 6 years ago
- A Zeek package for the passive detection of "Ripple20" vulnerabilities in the Treck TCP/IP stack.☆33Jun 29, 2022Updated 3 years ago
- CVE-2020-1048 bypass: binary planting PoC☆33Aug 20, 2020Updated 5 years ago
- A collection of projects supporting Azure Integrations☆32Dec 1, 2025Updated 3 months ago
- Mapping Corelight or Zeek data to Elastic Common Schema fields☆33Nov 3, 2025Updated 4 months ago
- Tracks the ISS and when it is near your area it will send a tweet!☆12Feb 25, 2021Updated 5 years ago
- ssh user enumeration☆12Mar 21, 2023Updated 2 years ago
- Developer enhancements (DX) for FalconPy, the CrowdStrike Python SDK☆48Feb 10, 2026Updated 3 weeks ago
- Beats for Raspberry Pi / ARM☆84Dec 29, 2021Updated 4 years ago
- Strayacoin Core☆13Dec 29, 2021Updated 4 years ago
- morphHTA - Morphing Cobalt Strike's evil.HTA☆10Jun 3, 2017Updated 8 years ago
- Automated social media post sharing☆11Jan 5, 2022Updated 4 years ago