hosom / file-extraction
Extract files from network traffic with Zeek.
☆101Updated 5 years ago
Alternatives and similar repositories for file-extraction
Users that are interested in file-extraction are comparing it to the libraries listed below
Sorting:
- Various Bro scripts☆96Updated 8 years ago
- Bro scripts to be shared with the community☆109Updated 12 years ago
- ☆75Updated 3 years ago
- TIH is an intelligence tool that helps you in searching for IOCs across multiple openly available security feeds and some well known APIs…☆151Updated 11 months ago
- Bro scripts written by CrowdStrike Services☆146Updated 4 years ago
- Bro/Zeek integration with osquery☆94Updated 4 years ago
- Rule sets for Sagan☆104Updated 4 years ago
- IOC (Indicator of Compromise) Extractor: a program to help extract IOCs from text files.☆134Updated 9 years ago
- Scripts for Bro IDS and ELK Stack☆57Updated 9 years ago
- Misc. Bro scripts☆64Updated 7 years ago
- This repository contains all public indicators identified by 401trg during the course of our investigations. It also includes relevant ya…☆122Updated 4 years ago
- ☆71Updated 3 years ago
- Contributed Bro Scripts☆30Updated 10 years ago
- ☆85Updated 11 years ago
- A web-based tool to assist the work of the intuitive threat analysts.☆113Updated 6 years ago
- Bro-IDS scripts☆50Updated 8 years ago
- CIF v3 -- the fastest way to consume threat intelligence☆182Updated 2 years ago
- Analysis scripts for the Bro Intrusion Detection System☆58Updated 11 years ago
- This project is no longer maintained. There's a successor at https://github.com/zeek/zeek-agent-v2☆123Updated 4 years ago
- Network Forensics Bro scripts & pcap samples☆62Updated 11 years ago
- Dovehawk is a Zeek module that automatically imports MISP indicators and reports Sightings☆123Updated 3 years ago
- A tool to generate Snort rules based on public IP reputation data☆56Updated 11 years ago
- Mapping NSM rules to MITRE ATT&CK☆71Updated 4 years ago
- Malware/IOC ingestion and processing engine☆105Updated 6 years ago
- ☆168Updated 3 years ago
- Detect cryptocurrency mining traffic with Zeek.☆46Updated 4 years ago
- DGA Domains detection☆66Updated 7 years ago
- Docker container for MISP☆96Updated 6 years ago
- Malware Sinkhole List in various formats☆103Updated 2 years ago
- QRadio ~ Best Threat Intelligence Radio ~ Tune In!☆96Updated 8 years ago