fatemabw / kyd
DHCP Fingerprinting
☆28Updated 4 years ago
Alternatives and similar repositories for kyd
Users that are interested in kyd are comparing it to the libraries listed below
Sorting:
- ☆16Updated 4 months ago
- Zeek package to generate a SMB client fingerprint☆27Updated 5 years ago
- Zeek package to detect Zerologon☆11Updated 3 years ago
- Remote Desktop Client Fingerprint script for Zeek. Based off of https://github.com/0x4D31/fatt☆39Updated last year
- Zeek plugin to generate data on per-packet sizes and intervals☆14Updated 5 years ago
- Bro PCAP Processing and Tagging API☆28Updated 7 years ago
- ☆14Updated last year
- This repository contains all the config files and scripts used for our Open Source Endpoint monitoring project.☆34Updated 5 years ago
- Suricata rule and intel index☆30Updated last month
- CLI tool for testing Office documents with macros using MaliciousMacroBot☆11Updated last year
- This module detects HTTP requests that are non RFC compliant and used for smuggling☆12Updated 2 years ago
- Create dataset for suricata with indicators of MISP instances and add sightings in MISP if an indicator of dataset generates an alert☆36Updated 2 years ago
- Check IOC provided by a MISP instance on Suricata events☆17Updated 5 years ago
- CyCAT.org API back-end server including crawlers☆29Updated 2 years ago
- Bro IDS + ELK Stack to detect and block data exfiltration☆46Updated 6 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago
- ☆10Updated 9 years ago
- Threat Detection Rules (Snort/Sigma/Yara)☆13Updated last year
- PacketSled's Bro AMQP Writer Plugin☆11Updated 8 years ago
- command line tool to use the DNSDB Flexible Search API extensions.☆16Updated 9 months ago
- CyCAT.org taxonomies☆15Updated 3 years ago
- ☆14Updated 6 years ago
- Presentation materials for talks I've given.☆20Updated 5 years ago
- Web based Manager for Yara Rules☆57Updated 5 years ago
- ☆16Updated last year
- Go implementation of the Community ID flow hashing standard☆20Updated last month
- Log4j Exploit Detection Logic for Zeek☆19Updated last year
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 4 years ago
- Historical Observations of Actionable Reputation Data☆13Updated 6 years ago
- pocket guide for core threat hunting concepts☆23Updated 5 years ago