A Docker container for Moloch based on minimal Debian
☆13Jun 23, 2017Updated 8 years ago
Alternatives and similar repositories for docker-moloch
Users that are interested in docker-moloch are comparing it to the libraries listed below
Sorting:
- A Docker container for Moloch based on minimal Debian☆26Jan 25, 2016Updated 10 years ago
- ☆12Jan 28, 2020Updated 6 years ago
- ☆18Jan 18, 2022Updated 4 years ago
- Tachikoma is a security alerting framework for human beings☆22Sep 7, 2018Updated 7 years ago
- Presentation materials for talks I've given.☆20Oct 14, 2019Updated 6 years ago
- Bro IDS + ELK Stack to detect and block data exfiltration☆46Oct 31, 2018Updated 7 years ago
- This repository regroups the Yara Rules for the Unprotect Project☆26Nov 19, 2020Updated 5 years ago
- Cyber Analytics Platform and Examination System (CAPES) Project Page☆60Aug 3, 2019Updated 6 years ago
- ☆35Jun 22, 2021Updated 4 years ago
- Repository of scripts/tools that may be useful in Security Operations Centres (SOC)☆55Nov 25, 2020Updated 5 years ago
- BLACKPHENIX is an open source malware analysis automation framework composed of services, scripts, plug-ins, and tools and is based on a …☆31May 22, 2023Updated 2 years ago
- The "Let's-defend-solution" directory contains the answers to all paths of the Let's Defend platform that were saved by the creator 8 mon…☆12Apr 27, 2023Updated 2 years ago
- Security information and event management, masters's diploma☆10Aug 3, 2015Updated 10 years ago
- The plan is to have a replacement for psexec☆32Aug 15, 2018Updated 7 years ago
- Simple host-based permit-by-exception iptables generation script☆16Sep 5, 2020Updated 5 years ago
- attempt to perma root the NEC Terrain android phone☆10Jul 24, 2015Updated 10 years ago
- Automated install scripts for Cuckoo sandbox☆38Dec 5, 2017Updated 8 years ago
- Powershell module to help with all file server tasks without using WMI☆13Feb 25, 2026Updated last week
- ☆10Dec 5, 2017Updated 8 years ago
- GIAnT, the Generic Implementation ANalysis Toolkit☆12Jul 4, 2018Updated 7 years ago
- Generate a Yara rule to find base64-encoded files containg a specific keyword☆40Jul 13, 2018Updated 7 years ago
- Foxhound: Blackbox - A Raspberry Pi NSM☆37Jan 20, 2018Updated 8 years ago
- A tool for performing replay and sniffing CAN bus traffic.☆43Sep 23, 2020Updated 5 years ago
- Kibana 4 Templates for Suricata IDPS☆33Jul 28, 2016Updated 9 years ago
- Validates yara rules and tries to repair the broken ones.☆41Sep 5, 2020Updated 5 years ago
- domain information in JSON format☆10Jun 7, 2017Updated 8 years ago
- My logstash plugins. Filter: sig (for security detect -> IOC, sig, New value, Reference, link, frequence, ...). Output: alert created by …☆10Jul 26, 2019Updated 6 years ago
- Network Security Monitoring Console☆22Feb 3, 2010Updated 16 years ago
- set of bash scripts to get a list of bad reputation IP addresses☆11Dec 17, 2015Updated 10 years ago
- Automation Framework has many tools commonly used for Network Automation☆10Sep 4, 2025Updated 6 months ago
- NTOP nDPI Library example usage and FFI bindings for Lua, NodeJS☆13Jan 29, 2018Updated 8 years ago
- USIM, EDITOR, IMSI, ICCID, MCC/MNC, SPN, GID1, GID2☆15Mar 8, 2020Updated 5 years ago
- ☆10Feb 16, 2018Updated 8 years ago
- Java ClassLoader for Nashorn with Maven support. Allows to define any Java dependencies directly in scripts.☆13Oct 22, 2019Updated 6 years ago
- Indicator of Compromise Mapping Service☆12Apr 15, 2014Updated 11 years ago
- Viewstate Hidden Control Enumerator☆17Sep 12, 2013Updated 12 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 6 years ago
- Build your own threat hunting maturity model☆11Oct 29, 2017Updated 8 years ago
- Repository resource threat intelligence for SOC☆10Sep 14, 2018Updated 7 years ago