firnsy / barnyard2
Barnyard2 is a dedicated spooler for Snort's unified2 binary output format.
☆350Updated 9 months ago
Alternatives and similar repositories for barnyard2:
Users that are interested in barnyard2 are comparing it to the libraries listed below
- Pulled Pork for Snort and Suricata rule management (from Google code)☆423Updated 3 years ago
- Scirius is a web application for Suricata ruleset management and threat hunting.☆638Updated last month
- idstools: Snort and Suricata Rule and Event Utilities in Python (Including a Rule Update Tool)☆281Updated last year
- Alienvault ossim☆119Updated 5 years ago
- Suricata Extreme Performance Tuning guide☆205Updated 6 years ago
- Web service for scanning pcaps with snort☆108Updated 6 years ago
- A Simple QUEry and Report Tool☆142Updated 5 years ago
- Sguil client for NSM☆215Updated 9 months ago
- ** README ** This repo has MOVED to https://github.com/quadrantsec/sagan☆228Updated 3 years ago
- Passive Real-time Asset Detection System☆232Updated 7 months ago
- Snort + Barnyard2 + Pulledpork → The easy way!☆167Updated 3 years ago
- Automated deployment scripts for the RockNSM network hunting distribution.☆447Updated last year
- Templates for Kibana/Logstash to use with Suricata IDPS☆80Updated 8 years ago
- MozDef: The Mozilla Defense Platform☆67Updated 4 years ago
- Web Based Event Viewer (GUI) for Suricata EVE Events in Elastic Search☆438Updated last week
- OSSEC Documentation☆137Updated last year
- a network packet capture compiler☆196Updated 2 years ago
- Docker based Suricata, Elasticsearch, Logstash, Kibana, Scirius aka SELKS☆184Updated 2 years ago
- Snort FAQ☆116Updated 3 years ago
- ☆167Updated 3 years ago
- OSSEC Web User Interface - Unmaintained!!☆164Updated 3 years ago
- DEPRECATED - USE v3 (bearded-avenger)☆228Updated 7 years ago
- Bro IDS Dockerfile☆129Updated 5 years ago
- Suricata, Snort and Zeek IDS rule and pcap testing system☆464Updated last week
- Bro IDS programs collection.☆146Updated 5 years ago
- Honeypot Intelligence with Splunk☆254Updated 6 years ago
- The Correlated CVE Vulnerability And Threat Intelligence Database API☆936Updated 3 years ago
- Graylog Processing Pipeline functions to enrich log messages with IoC information from threat intelligence databases☆151Updated 10 months ago
- OpenSOC Apache Hadoop Code☆576Updated 4 years ago