idaholab / Malcolm
Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs and Suricata alerts.
☆402Updated 3 weeks ago
Alternatives and similar repositories for Malcolm:
Users that are interested in Malcolm are comparing it to the libraries listed below
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆2,103Updated 3 weeks ago
- A set of Zeek scripts to detect ATT&CK techniques.☆585Updated 9 months ago
- Zeek-Formatted Threat Intelligence Feeds☆359Updated this week
- SIEM Tactics, Techiques, and Procedures☆623Updated this week
- Transform Linux Audit logs for SIEM usage☆761Updated this week
- A standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logs☆710Updated 2 weeks ago
- Cortex Analyzers Repository☆455Updated last week
- MISP trainings, threat intel and information sharing training materials with source code☆407Updated this week
- MITRE Caldera™ for OT Plugins & Capabilities☆207Updated 5 months ago
- A knowledge base of actionable Incident Response techniques☆636Updated 2 years ago
- Incident Response Documentation made easy. Developed by Incident Responders for Incident Responders☆901Updated last year
- Mapping the MITRE ATT&CK Matrix with Osquery☆793Updated last year
- Suricata, Snort and Zeek IDS rule and pcap testing system☆474Updated 3 months ago
- Actionable analytics designed to combat threats☆983Updated 2 years ago
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆350Updated last week
- Configuration files for the SOF-ELK VM☆1,577Updated 3 weeks ago
- A curated Cyber "Security Orchestration, Automation and Response (SOAR)" awesome list.☆858Updated 8 months ago
- Documentation of Cortex☆174Updated last year
- Docker image for MISP☆125Updated last month
- Set of EVTX samples (>270) mapped to MITRE ATT&CK tactic and techniques to measure your SIEM coverage or developed new use cases.☆563Updated 3 months ago
- PCAP Samples for Different Post Exploitation Techniques☆356Updated 3 years ago
- Online hash checker for Virustotal and other services☆824Updated last month
- ReversingLabs YARA Rules☆814Updated 2 weeks ago
- MISP Docker (XME edition)☆282Updated last year
- Python library to parse and convert Sigma rules into queries (and whatever else you could imagine)☆442Updated last week
- A Suricata Docker image.☆280Updated 3 weeks ago
- OpenCTI Connectors☆433Updated this week
- A Ruleset to enhance detection capabilities of Ossec using Sysmon☆92Updated 3 years ago
- ⚡️ Catalyst is a self-hosted, open source incident response platform and ticket system that helps to automate alert handling and incident…☆390Updated last week
- Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by devel…☆602Updated last month