idaholab / MalcolmLinks
Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs and Suricata alerts.
☆448Updated last week
Alternatives and similar repositories for Malcolm
Users that are interested in Malcolm are comparing it to the libraries listed below
Sorting:
- Zeek-Formatted Threat Intelligence Feeds☆381Updated this week
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆402Updated 2 weeks ago
- This project is a SIEM with SIRP and Threat Intel, all in one.☆464Updated last year
- A set of Zeek scripts to detect ATT&CK techniques.☆620Updated last year
- OpenCTI Connectors☆498Updated this week
- Docker image for MISP☆135Updated last week
- Transform Linux Audit logs for SIEM usage☆805Updated last week
- SIEM Tactics, Techiques, and Procedures☆683Updated 3 weeks ago
- ⚡️ Catalyst is a self-hosted, open source incident response platform and ticket system that helps to automate alert handling and incident…☆498Updated last week
- Zeek Log Cheatsheets☆298Updated 4 months ago
- Cortex Analyzers Repository☆468Updated last week
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆2,302Updated last week
- Incident Response Documentation made easy. Developed by Incident Responders for Incident Responders☆955Updated 2 years ago
- MISP Docker (XME edition)☆283Updated 2 years ago
- A utility to safely generate malicious network traffic patterns and evaluate controls.☆1,346Updated last year
- A curated list of awesome things related to Suricata☆212Updated last month
- Sagan is a multi-threads, high performance log analysis engine. At it's core, Sagan similar to Suricata/Snort but with logs rather th…☆190Updated 2 months ago
- MITRE Caldera™ for OT Plugins & Capabilities☆231Updated last week
- Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by devel…☆703Updated last month
- A production ready Dockered MISP☆299Updated last week
- Suricata rules for network anomaly detection☆180Updated last month
- Indicators of Compromise☆243Updated last week
- A Suricata Docker image.☆309Updated last month
- MISP trainings, threat intel and information sharing training materials with source code☆421Updated last week
- UAC is a powerful and extensible incident response tool designed for forensic investigators, security analysts, and IT professionals. It …☆1,212Updated last week
- Collaborative Incident Response platform☆1,339Updated last month
- DFIRTrack - The Incident Response Tracking Application☆530Updated last year
- Configuration files for the SOF-ELK VM☆1,704Updated 2 weeks ago
- A (nearly) production ready Dockered MISP☆230Updated last year
- Python library to parse and convert Sigma rules into queries (and whatever else you could imagine)☆510Updated 2 weeks ago