idaholab / Malcolm
Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs and Suricata alerts.
☆382Updated this week
Alternatives and similar repositories for Malcolm:
Users that are interested in Malcolm are comparing it to the libraries listed below
- Zeek-Formatted Threat Intelligence Feeds☆352Updated this week
- A set of Zeek scripts to detect ATT&CK techniques.☆577Updated 8 months ago
- MISP Docker (XME edition)☆283Updated last year
- Suricata, Snort and Zeek IDS rule and pcap testing system☆471Updated last month
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆2,065Updated this week
- MISP trainings, threat intel and information sharing training materials with source code☆402Updated 2 weeks ago
- DFIRTrack - The Incident Response Tracking Application☆491Updated 5 months ago
- Mapping the MITRE ATT&CK Matrix with Osquery☆788Updated last year
- Signatures and IoCs from public Volexity blog posts.☆350Updated 2 weeks ago
- Documentation of TheHive☆396Updated last year
- OpenCTI Connectors☆414Updated this week
- Python library using the MISP Rest API☆452Updated this week
- A Ruleset to enhance detection capabilities of Ossec using Sysmon☆91Updated 2 years ago
- Transform Linux Audit logs for SIEM usage☆749Updated this week
- A standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logs☆703Updated last month
- Cortex Analyzers Repository☆447Updated this week
- Documentation of Cortex☆173Updated last year
- A curated Cyber "Security Orchestration, Automation and Response (SOAR)" awesome list.☆843Updated 6 months ago
- This content is analysis and research of the data sources currently listed in ATT&CK.☆408Updated last year
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆341Updated this week
- OpenCTI Docker deployment helpers☆175Updated this week
- SIEM Tactics, Techiques, and Procedures☆615Updated last week
- Repository of YARA rules made by Trellix ATR Team☆576Updated last year
- A Suricata Docker image.☆269Updated 2 months ago
- Web Based Event Viewer (GUI) for Suricata EVE Events in Elastic Search☆443Updated this week
- Extract and aggregate threat intelligence.☆849Updated last year
- Set of EVTX samples (>270) mapped to MITRE ATT&CK tactic and techniques to measure your SIEM coverage or developed new use cases.☆551Updated last month
- A Splunk app mapped to MITRE ATT&CK to guide your threat hunts☆1,146Updated last year
- Actionable analytics designed to combat threats☆981Updated 2 years ago
- A curated list of awesome things related to TheHive & Cortex☆177Updated 3 years ago