eldondev / SnortLinks
An IDS (Couldn't find Snort on github when I wanted to fork)
☆120Updated 13 years ago
Alternatives and similar repositories for Snort
Users that are interested in Snort are comparing it to the libraries listed below
Sorting:
- Open Source Network Forensic Analysis Tool (NFAT)☆195Updated 5 years ago
- idstools: Snort and Suricata Rule and Event Utilities in Python (Including a Rule Update Tool)☆282Updated 4 months ago
- Web service for scanning pcaps with snort☆110Updated 7 years ago
- A set of ICS IDS rules for use with Suricata.☆50Updated 2 years ago
- ☆174Updated 4 years ago
- Mirror of https://github.com/zeek/zeek☆176Updated 2 years ago
- a network packet capture compiler☆204Updated 3 years ago
- Snort in Docker for Network Functions Virtualization (NFV)☆110Updated 6 years ago
- Suspicious DGA from PDNS and Sandbox.☆187Updated 3 years ago
- Passive Real-time Asset Detection System☆248Updated last year
- virtual honeypots☆386Updated 2 years ago
- Download pcap files from http://www.malware-traffic-analysis.net/☆81Updated 7 years ago
- PROJECT DELTA: SDN SECURITY EVALUATION FRAMEWORK☆222Updated 6 years ago
- Extract files from network traffic with Zeek.☆103Updated 5 years ago
- This repository will hold PCAP IOC data related with known malware samples (owner: Bryant Smith)☆108Updated 4 years ago
- The repository that contains the algorithms for generating domain names, dictionaries of malicious domain names. Developed to research th…☆221Updated 8 years ago
- Evading Snort Intrusion Detection System.☆78Updated 4 years ago
- Visualize network topologies and collect graph statistics based on pcap files☆352Updated 2 years ago
- Public Repository of all Publicly Available Packet Captures that I've used or come across☆182Updated 12 years ago
- This is a malware analysis project which expecte to generate snort rule via malicious network traffic☆28Updated 2 years ago
- Rule sets for Sagan☆105Updated 4 years ago
- The tool for updating your Suricata rules.☆282Updated 3 weeks ago
- PROJECT DELTA: SDN SECURITY EVALUATION FRAMEWORK☆89Updated 2 years ago
- Useful resources for Zeek(https://zeek.org/) (Bro(http://bro.org/))☆31Updated 5 years ago
- The pattern matching swiss knife☆140Updated 5 years ago
- Digital Bond's IDS/IPS rules for ICS and ICS protocols.☆147Updated 5 years ago
- Suricata, Snort and Zeek IDS rule and pcap testing system☆504Updated 2 months ago
- Templates for Kibana/Logstash to use with Suricata IDPS☆81Updated 9 years ago
- Power of Community 2013 conference special release of ICS/SCADA toolkit☆88Updated 12 years ago
- add dpdk interface and packet processing to suricata in worker mode☆64Updated 5 years ago