devnull-hub / rita-zeek-rpi4
Ideas based on How to use a Raspberry PI as a Network Sensor https://activecountermeasures.com/raspberry_pi_sensor/How%20to%20use%20a%20Raspberry%20Pi%20as%20a%20network%20sensor.pdf
☆9Updated last year
Related projects ⓘ
Alternatives and complementary repositories for rita-zeek-rpi4
- A curated list of Awesome Threat Intelligence resources☆46Updated 6 years ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆66Updated last year
- Corelight@Home script☆40Updated last year
- ☆73Updated last year
- Dictionary of CTI-related acronyms, terms, and jargon☆135Updated 11 months ago
- Template for building a packet sniffer☆14Updated 7 months ago
- Extracts fields from zeek logs, compatible with zeek-cut☆19Updated 4 months ago
- A port of BHIS's Backdoors & Breaches for playingcards.io☆60Updated last year
- Passive OS detection based on SYN packets without Transmitting any Data☆45Updated last year
- ☆54Updated 3 years ago
- Tools for simulating threats☆174Updated last year
- Creation of a laboratory for malware analysis in AWS☆85Updated last year
- All my slides for any talks☆23Updated last month
- Data Driven Threat Hunting on the RaspberryPi☆28Updated 2 years ago
- DigitalShadows Alert Feeder for TheHive, an Open Source and Free Security Incident Response Platform☆35Updated 5 years ago
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆116Updated 11 months ago
- ☆46Updated 2 years ago
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆50Updated 2 years ago
- links collected from SOC Core Skills class☆84Updated 3 years ago
- Traps web spiders☆63Updated 4 years ago
- Web application to create indexes for GIAC certification examinations.☆134Updated last year
- Docker Crash Course: How to containerize your favorite security tools☆27Updated last year
- Distribution of the SANS SEC504 Windows Cheat Sheet Lab☆66Updated 4 years ago
- Slides for my conference talks☆43Updated last year
- Identifies physical locations where a laptop has been based upon wireless profiles and wireless data recorded in event logs☆90Updated 3 years ago
- Wrap any binary into a cached webserver☆53Updated 2 years ago
- This repository is for the vagrant instances of VulnHub machines☆41Updated 2 months ago
- Powershell - web traffic whitenoise generator☆46Updated 4 years ago
- Device profile: Define acceptable amounts of traffic for your devices and see a report of outliers.☆16Updated 4 years ago
- Startup project to create a simple to deploy honey pot style detection tool for alerting on common network attacks☆39Updated 4 years ago