danielguerra69 / docker-molochLinks
A Docker container for Moloch based on minimal Debian
☆13Updated 8 years ago
Alternatives and similar repositories for docker-moloch
Users that are interested in docker-moloch are comparing it to the libraries listed below
Sorting:
- Scripts for Bro IDS and ELK Stack☆57Updated 10 years ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆71Updated 6 years ago
- Bro IDS + ELK Stack to detect and block data exfiltration☆46Updated 7 years ago
- Automatic firewall rule orchestator.☆83Updated 8 years ago
- A Docker container for Moloch based on minimal Debian☆26Updated 9 years ago
- Cyber Analytics Platform and Examination System (CAPES) Project Page☆60Updated 6 years ago
- Security Onion Elastic Stack☆46Updated 4 years ago
- An Ubuntu 16.04 build containing Suricata, PulledPork, Bro, and Splunk☆23Updated 7 years ago
- The Intelligent Honey Net Project attempts to create actionable information from honeypots☆64Updated 10 years ago
- Bro scripts to be shared with the community☆111Updated 12 years ago
- Automated install scripts for Cuckoo sandbox☆38Updated 7 years ago
- BTG's purpose is to make fast and efficient search on IOC☆71Updated 7 years ago
- Modern Honey Network App for Splunk☆50Updated 6 years ago
- The Seeker of IOC☆131Updated 5 years ago
- The Bro/Zeek language cheat sheet☆53Updated 12 years ago
- Basic Anomaly IDS capabilities with Python and Bro☆105Updated 7 years ago
- Passive DNS V2☆60Updated 11 years ago
- brostash: Linux distribution based on Debian and focusing on network security events collection☆34Updated 5 years ago
- An ICAP Server with yara scanner for URL and content.☆59Updated 11 months ago
- Malware/IOC ingestion and processing engine☆107Updated 7 years ago
- ☆72Updated 4 years ago
- ☆85Updated 12 years ago
- Cyber Defence Monitoring Course Suite :: Suricata, Bro, Moloch☆61Updated 8 years ago
- OpenDNS Graph Miner☆45Updated 8 years ago
- Cyber Intel Management☆50Updated 7 years ago
- Honeypot repo☆48Updated 10 years ago
- ☆24Updated 5 years ago
- Harbinger Threat Intelligence☆83Updated 9 years ago
- Credential Phish Analysis and Automation☆97Updated 7 years ago
- An informational repo about hunting for adversaries in your IT environment.☆14Updated 8 years ago