fatemabw / kyd
DHCP Fingerprinting
☆28Updated 4 years ago
Alternatives and similar repositories for kyd:
Users that are interested in kyd are comparing it to the libraries listed below
- Zeek package to generate a SMB client fingerprint☆27Updated 4 years ago
- ☆15Updated 10 months ago
- Remote Desktop Client Fingerprint script for Zeek. Based off of https://github.com/0x4D31/fatt☆39Updated last year
- ☆16Updated 2 months ago
- Zeek plugin to generate data on per-packet sizes and intervals☆14Updated 4 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 4 years ago
- Zeek package to detect Zerologon☆11Updated 3 years ago
- Bro IDS + ELK Stack to detect and block data exfiltration☆46Updated 6 years ago
- Check IOC provided by a MISP instance on Suricata events☆17Updated 5 years ago
- Zeek Extension to Collect Metadata for Profiling of Endpoints and Proxies☆27Updated 11 months ago
- Bro PCAP Processing and Tagging API☆28Updated 7 years ago
- Some rules, scripts of some use to us☆9Updated 3 months ago
- ☆14Updated 6 years ago
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆30Updated 2 years ago
- Create dataset for suricata with indicators of MISP instances and add sightings in MISP if an indicator of dataset generates an alert☆37Updated 2 years ago
- D-Scan project for office document analysis and generating flow diagram of macro in documents. For demo visit☆29Updated 3 months ago
- This repository contains all the config files and scripts used for our Open Source Endpoint monitoring project.☆34Updated 5 years ago
- Steezy - Ghetto Yara Generation☆15Updated last year
- A tool to help malware analysts signature unique parts of RTF documents☆29Updated last month
- Exporting MISP event attributes to yara rules usable with Thor apt scanner☆24Updated 7 years ago
- A GUI/REST interface to find similarities in large sets (think: binaries). Based on ssdeep.☆19Updated 2 years ago
- Suricata rule and intel index☆30Updated 2 months ago
- A Postfix filter which takes a piped message and submits it to Cuckoo Sandbox☆11Updated 8 years ago
- API to use Cymru services☆27Updated 11 years ago
- Dashboards for conducting forensic investigation using windows events in Kibana☆17Updated 5 years ago
- Historical Observations of Actionable Reputation Data☆13Updated 6 years ago
- ☆10Updated 9 years ago
- Broctl plugin for automatically executing 'setcap' on each node after an install☆13Updated 4 years ago
- A collection of Indicators of Compromise (IoCs), most aligning with samples derived from the signatures in the YARA-Signatures repo☆30Updated 4 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago