geekscrapy / docker-snortLinks
Snort + Pulledpork + Websnort in Docker!
☆21Updated 3 years ago
Alternatives and similar repositories for docker-snort
Users that are interested in docker-snort are comparing it to the libraries listed below
Sorting:
- Bro IDS + ELK Stack to detect and block data exfiltration☆46Updated 6 years ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆72Updated 6 years ago
- Dovehawk is a Zeek module that automatically imports MISP indicators and reports Sightings☆122Updated 4 years ago
- A web-based tool to assist the work of the intuitive threat analysts.☆112Updated 6 years ago
- Mass static malware analysis tool☆95Updated 3 years ago
- Security Onion Elastic Stack☆46Updated 4 years ago
- Threat hunting repo for my independent study on threat hunting with OSQuery☆27Updated 7 years ago
- Various tools and scripts☆43Updated 2 years ago
- Malware/IOC ingestion and processing engine☆107Updated 6 years ago
- ☆35Updated 4 years ago
- This repository contains all the config files and scripts used for our Open Source Endpoint monitoring project.☆34Updated 6 years ago
- Bluewall is a firewall framework designed for offensive and defensive cyber professionals.☆106Updated 6 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Updated 7 years ago
- Web based Manager for Yara Rules☆58Updated 5 years ago
- Simple Docker Honeypot server emulating small snippets of the Docker HTTP API☆31Updated 5 years ago
- Hunting IOCs all day every day...☆86Updated 2 years ago
- This repository contains all public indicators identified by 401trg during the course of our investigations. It also includes relevant ya…☆122Updated 4 years ago
- Sorta reverse implementation of ShoVAT - Also includes NMAP banner regex results☆17Updated 6 years ago
- ☆13Updated 6 years ago
- intelligence-icons is a collection of icons and diagrams for building training and marketing materials around Intelligence sharing; inclu…☆41Updated 6 years ago
- Automated Memory Forensic☆34Updated 7 years ago
- automate your MISP installs☆68Updated 5 years ago
- An informational repo about hunting for adversaries in your IT environment.☆14Updated 8 years ago
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆103Updated 3 months ago
- brostash: Linux distribution based on Debian and focusing on network security events collection☆34Updated 5 years ago
- Extract indicators of compromise from text, including "escaped" ones.☆162Updated 5 years ago
- mindmap created for tools can be used during analysis/investigation☆27Updated 8 years ago
- ☆52Updated 7 years ago
- Python script to automatically create sigma rules from The hive observables☆25Updated 6 years ago
- Remote Desktop Client Fingerprint script for Zeek. Based off of https://github.com/0x4D31/fatt☆40Updated 2 years ago