danielguerra69 / bro-debian-elasticsearchLinks
bro on debian with elasticsearch support
☆24Updated 8 years ago
Alternatives and similar repositories for bro-debian-elasticsearch
Users that are interested in bro-debian-elasticsearch are comparing it to the libraries listed below
Sorting:
- brostash: Linux distribution based on Debian and focusing on network security events collection☆34Updated 5 years ago
- Scripts for Bro IDS and ELK Stack☆57Updated 10 years ago
- Dashboards and loader for ROCK NSM dashboards☆49Updated 2 years ago
- Top DNS Measurement for Bro☆11Updated 5 years ago
- Dockerfiles for NSM tools☆84Updated 8 years ago
- Bro scripts for the ROCK platform. http://rocknsm.io☆34Updated 2 years ago
- Bro IDS + ELK Stack to detect and block data exfiltration☆46Updated 6 years ago
- Add POST body excerpt to Bro's HTTP log☆14Updated last year
- brocon-15 scripts☆13Updated 8 years ago
- A Docker container for Moloch based on minimal Debian☆13Updated 8 years ago
- Cyber Analytics Platform and Examination System (CAPES) Project Page☆60Updated 6 years ago
- A Docker container for Moloch based on minimal Debian☆26Updated 9 years ago
- Scripts and integrations for OSSEC☆41Updated 9 years ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆72Updated 6 years ago
- SIAC is an enterprise SIEM built on open-source technology.☆115Updated 6 years ago
- A RESTful API frontend for Stenographer☆54Updated 2 years ago
- Kibana 4 Templates for Suricata IDPS☆33Updated 9 years ago
- Docker based Suricata, Elasticsearch, Logstash, Kibana, Scirius aka SELKS☆184Updated 2 years ago
- scan-detection policies for bro☆16Updated 7 months ago
- ☆141Updated last year
- ☆24Updated 5 years ago
- Detect HTTP stalling attacks like slowloris with Bro☆19Updated 7 years ago
- vagrant multi-machine: Moloch, Bro,Suricata,ElasticSearch,Kibana☆41Updated 10 years ago
- Generates visualizations from the output of flow tools such as SiLK.☆35Updated 8 years ago
- The Bro/Zeek language cheat sheet☆53Updated 12 years ago
- ☆38Updated 7 years ago
- ☆72Updated 3 years ago
- A Simple QUEry and Report Tool☆142Updated 5 years ago
- Graylog Processing Pipeline functions to enrich log messages with IoC information from threat intelligence databases☆155Updated last year
- Rule sets for Sagan☆105Updated 4 years ago