gradiuscypher / grIDSLinks
My network monitoring solution and tools that go along with it.
☆62Updated 3 years ago
Alternatives and similar repositories for grIDS
Users that are interested in grIDS are comparing it to the libraries listed below
Sorting:
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆72Updated 6 years ago
- Automatic firewall rule orchestator.☆83Updated 7 years ago
- Basic Anomaly IDS capabilities with Python and Bro☆105Updated 7 years ago
- Security Onion Elastic Stack☆46Updated 4 years ago
- Schillings SwordPhish empowers organisations and engages its employees to establish the key component of any cyber security strategy: th…☆107Updated 7 years ago
- Foxhound: Blackbox - A Raspberry Pi NSM☆37Updated 7 years ago
- Cyber Analytics Platform and Examination System (CAPES) Project Page☆60Updated 6 years ago
- brostash: Linux distribution based on Debian and focusing on network security events collection☆34Updated 4 years ago
- Serverless, low cost, threat intel aggregation for enterprise or personal use, backed by ElasticSearch.☆141Updated 2 years ago
- Bluewall is a firewall framework designed for offensive and defensive cyber professionals.☆106Updated 6 years ago
- GoatRider is a simple tool that will dynamically pull down Artillery Threat Intelligence Feeds, TOR, AlienVaults OTX, and the Alexa top 1…☆141Updated 6 years ago
- Scripts for Bro IDS and ELK Stack☆57Updated 9 years ago
- A powershell script for creating a Windows honeyport.☆89Updated 4 months ago
- This is a repository from Adam Swan and I's presentation on Windows Logs Zero 2 Hero.☆22Updated 7 years ago
- Bro IDS + ELK Stack to detect and block data exfiltration☆46Updated 6 years ago
- ☆141Updated last year
- Modern Honey Network App for Splunk☆51Updated 5 years ago
- The Intelligent Honey Net Project attempts to create actionable information from honeypots☆62Updated 9 years ago
- Check_ioc is a script to check for various, selectable indicators of compromise on Windows systems via PowerShell and Event Logs. It was …☆79Updated 7 years ago
- Stop searching for sample hashes on 10 different sites.☆66Updated 7 years ago
- ☆38Updated 7 years ago
- Credential Phish Analysis and Automation☆97Updated 7 years ago
- The Seeker of IOC☆129Updated 4 years ago
- Repository for Endpoint Security Testing☆35Updated 7 years ago
- Harbinger Threat Intelligence☆82Updated 9 years ago
- Core elements of the Modern Honey Network implemented in Docker☆34Updated 3 years ago
- A toolkit for Security Researchers☆127Updated 5 years ago
- Vulnerability Compliance Report Tool used to parse Nessus files into html reports created by SynerComm, Inc.☆166Updated 6 years ago
- A few scripts I put together for testing purposes and to automate a few capabilities while doing IR. These scripts are also part of my bl…☆55Updated 7 years ago
- ☆137Updated 6 years ago