hosom / bro-phishing
Detect Phishing with Bro IDS
☆18Updated 8 years ago
Alternatives and similar repositories for bro-phishing:
Users that are interested in bro-phishing are comparing it to the libraries listed below
- A collection of bro_scripts and signatures☆26Updated 5 years ago
- Bro Intel Feed Linter☆26Updated 5 years ago
- Collection of bro scripts☆9Updated 9 years ago
- CRITs IOC Visualization in Maltego☆27Updated 10 years ago
- Threat Intelligence distribution☆30Updated 9 years ago
- A framework that correlates Bro events☆18Updated 11 years ago
- Cli interface to threatcrowd.org☆19Updated 7 years ago
- brocon-15 scripts☆13Updated 8 years ago
- Various Bro scripts☆38Updated 10 years ago
- Python script that gets IOC from MISP and converts it into BRO intel files.☆13Updated 9 years ago
- API Tools☆27Updated 9 years ago
- scripts to help beginners program in Bro☆20Updated 11 years ago
- scan-detection policies for bro☆16Updated 3 months ago
- Bro-IDS scripts☆50Updated 8 years ago
- FireEye Alert json files to MISP Malware information sharing plattform (Alpha)☆32Updated 7 years ago
- Bro IDS + ELK Stack to detect and block data exfiltration☆46Updated 6 years ago
- ☆17Updated 7 years ago
- Script for generating Bro intel files from pdf or html reports☆77Updated 9 years ago
- Automation for VirusTotal☆31Updated 9 years ago
- integrating bro into yara☆33Updated 10 years ago
- Bro PCAP Processing and Tagging API☆28Updated 7 years ago
- An ICAP Server with yara scanner for URL and content.☆59Updated 4 months ago
- Multiple rules for yara-project for detect compiler/packer/protector☆33Updated 5 years ago
- This is a script module for Bro that encapsulates and detects activity related to the Mandiant APT1 report.☆47Updated 11 years ago
- ☆14Updated last year
- Various Bro scripts☆96Updated 8 years ago
- Command-line Interface for Binar.ly☆37Updated 8 years ago
- A collection of Bro scripts I've written☆40Updated 9 years ago
- Network Forensics Bro scripts & pcap samples☆62Updated 11 years ago
- Just another tool to extract Indicator of compromise (ioc) from files☆29Updated 9 years ago