da667 / AutosuricataLinks
first commit
☆20Updated 4 months ago
Alternatives and similar repositories for Autosuricata
Users that are interested in Autosuricata are comparing it to the libraries listed below
Sorting:
- Basic Anomaly IDS capabilities with Python and Bro☆105Updated 7 years ago
- Performs OCR on image files and scans them for matches to YARA rules☆42Updated 7 years ago
- A collection of scripts to initialize a windows VM to run all the malwares!☆107Updated 5 years ago
- Web based analysis platform for use with the AWS_IR command line tool.☆17Updated 9 years ago
- Scoring Engine for CTF competitions☆48Updated 2 years ago
- Cli interface to threatcrowd.org☆20Updated 8 years ago
- SMB Auto authentication Vulnerability☆34Updated 9 years ago
- Data Exfiltration and Command Execution via AAAA Records☆68Updated 9 years ago
- BTG's purpose is to make fast and efficient search on IOC☆71Updated 7 years ago
- This repository is a curated list of pro bono incident response entities.☆21Updated 2 years ago
- Unpack MIME attachments from a file and check them against virustotal.com☆44Updated 9 years ago
- PowerShell scripts for Hard Drive forensics and parsing Windows Artifacts☆56Updated 5 years ago
- Python-based cloud node for local use☆11Updated 7 years ago
- Queries to parse sysmon event log file with microsoft logparser☆58Updated 10 years ago
- Traceroute improved wrapper for CSIRT and CERT operators☆39Updated last year
- Python tool and library to help analyze files during malware triage and analysis.☆78Updated 5 years ago
- Clustering NMAP XML results to help make sense of large scan results.☆33Updated 3 years ago
- Honeypot log processor to create OTX Pulse entries☆28Updated 2 years ago
- threat-intelligence.eu website and repository of information about open standards, documents, methodologies and processes in threat intel…☆49Updated 2 months ago
- Things to know when DFIR occurs near a vault deployment.☆44Updated 7 years ago
- The Intelligent Honey Net Project attempts to create actionable information from honeypots☆64Updated 10 years ago
- SANS Hunting on the Cheap☆36Updated 9 years ago
- Some IR notes☆73Updated 9 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Updated 7 years ago
- Metadata Inspection Database Alerting System☆42Updated 12 years ago
- Proof of concept VBA code to add to Normal.dot to put restrictions on Word☆40Updated 9 years ago
- Modular tool to test exfiltration techniques.☆37Updated 8 years ago
- Using osquery for Mass Incident Detection & Response☆19Updated 9 years ago
- This project contains code for comparing or ranking APT capabilities and operational capacity. The metrics are meant to quantify, rank, o…☆35Updated 6 years ago
- AYY LMAO☆22Updated 9 years ago