ezarko / opendlpLinks
☆120Updated 11 years ago
Alternatives and similar repositories for opendlp
Users that are interested in opendlp are comparing it to the libraries listed below
Sorting:
- An open source data loss prevention solution.☆97Updated 11 years ago
- Alienvault ossim☆122Updated 11 months ago
- Web service for scanning pcaps with snort☆110Updated 7 years ago
- Open Source Network Forensic Analysis Tool (NFAT)☆199Updated 5 years ago
- The OTX Suricata Rule Generator can be used to create the rules and configuration for Suricata to alert on indicators from your OTX accou…☆112Updated last year
- a network packet capture compiler☆205Updated 3 years ago
- ☆174Updated 4 years ago
- This repository will hold PCAP IOC data related with known malware samples (owner: Bryant Smith)☆108Updated 4 years ago
- Extract files from network traffic with Zeek.☆103Updated 5 years ago
- A web-based tool to assist the work of the intuitive threat analysts.☆114Updated 6 years ago
- ☆206Updated 2 years ago
- The stratosphere testing framework is mean to help in the researching and verification of the behavioral models used by the Stratoshpere …☆50Updated 7 years ago
- A Simple QUEry and Report Tool☆142Updated 6 years ago
- This project is no longer maintained. There's a successor at https://github.com/zeek/zeek-agent-v2☆124Updated 5 years ago
- cve-search is a tool to import CVE (Common Vulnerabilities and Exposures) and CPE (Common Platform Enumeration) into a MongoDB to facilit…☆144Updated last month
- Passive Real-time Asset Detection System☆249Updated last year
- A repository for OSSEC rules and decoders☆54Updated 2 years ago
- Mirror of https://github.com/zeek/zeek☆176Updated 2 years ago
- ☆135Updated 4 years ago
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆103Updated 5 months ago
- Open Source Threat Intelligence Chat Bot☆322Updated 5 years ago
- MozDef: The Mozilla Defense Platform☆68Updated 5 years ago
- CapAnalysis source code repository☆89Updated 7 years ago
- Automated Tactics Techniques & Procedures☆259Updated 2 years ago
- Mapping NSM rules to MITRE ATT&CK☆73Updated 5 years ago
- Detecting Lateral Movement with Machine Learning☆139Updated 8 years ago
- The pattern matching swiss knife☆140Updated 5 years ago
- Templates for Kibana/Logstash to use with Suricata IDPS☆81Updated 9 years ago
- Tool for managing Zeek deployments.☆59Updated 3 weeks ago
- With the hope that someone finds the data useful, we used to periodically publish an archive of almost all of the non-sensitive vulnerabi…☆95Updated last year