crossroadsfpga / pigasus
100Gbps Intrusion Detection and Prevention System
☆680Updated 7 months ago
Alternatives and similar repositories for pigasus:
Users that are interested in pigasus are comparing it to the libraries listed below
- NFStream: a Flexible Network Data Analysis Framework.☆1,120Updated 7 months ago
- HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints…☆538Updated last year
- Graph platform for Detection and Response☆690Updated 2 years ago
- Tenzir is the data pipeline engine for security teams.☆669Updated this week
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆2,086Updated this week
- Mercury: network metadata capture and analysis☆455Updated 3 weeks ago
- FATT /fingerprintAllTheThings - a pyshark based script for extracting network metadata and fingerprints from pcap files and live network …☆664Updated last year
- Advanced Honeypot framework.☆1,244Updated last year
- Threat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysi…☆1,257Updated last year
- A package for capturing and analyzing network flow data and intraflow data, for network research, forensics, and security monitoring.☆1,326Updated last year
- Solitude is a privacy analysis tool that enables anyone to conduct their own privacy investigations. Whether a curious novice or a more a…☆372Updated 3 years ago
- Open EDR public repository☆2,383Updated last year
- Red Team K8S Adversary Emulation Based on kubectl☆817Updated 3 years ago
- A utility to safely generate malicious network traffic patterns and evaluate controls.☆1,295Updated 11 months ago
- ☆560Updated last year
- A Linux Auditd rule set mapped to MITRE's Attack Framework☆787Updated 4 years ago
- A repository for using osquery for incident detection and response☆842Updated 2 years ago
- DNS covert channel implant for Red Teams.☆731Updated 5 years ago
- Zui is a powerful desktop application for exploring and working with data. The official front-end to the Zed lake.☆1,836Updated this week
- hBPF = eBPF in hardware☆412Updated 2 years ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,510Updated 8 months ago
- Web Based Event Viewer (GUI) for Suricata EVE Events in Elastic Search☆452Updated last week
- Security event correlation engine for ELK stack☆436Updated 9 months ago
- ☆2,659Updated last year
- Suricata, Snort and Zeek IDS rule and pcap testing system☆473Updated 2 months ago
- Automated deployment scripts for the RockNSM network hunting distribution.☆453Updated last year
- PcapXray - A Network Forensics Tool - To visualize a Packet Capture offline as a Network Diagram including device identification, highli…☆1,714Updated 3 years ago
- Suricata IDS/IPS log analytics using the Elastic Stack.☆238Updated 3 years ago
- Using TLS 1.3 to evade censors, bypass network defenses, and blend in with the noise☆677Updated last year
- Guidance for mitigating obsolete Transport Layer Security configurations. #nsacyber☆272Updated 4 years ago