initconf / brocon-15Links
brocon-15 scripts
☆13Updated 8 years ago
Alternatives and similar repositories for brocon-15
Users that are interested in brocon-15 are comparing it to the libraries listed below
Sorting:
- Bro-IDS scripts☆50Updated 9 years ago
- Scripts for Bro IDS and ELK Stack☆57Updated 10 years ago
- scan-detection policies for bro☆16Updated 9 months ago
- ☆72Updated 3 years ago
- Various Bro scripts☆96Updated 9 years ago
- Threat Intelligence distribution☆30Updated 9 years ago
- Bro IDS + ELK Stack to detect and block data exfiltration☆46Updated 6 years ago
- Network Forensics Bro scripts & pcap samples☆63Updated 11 years ago
- Bro scripts to be shared with the community☆111Updated 12 years ago
- Detect Phishing with Bro IDS☆19Updated 8 years ago
- Bro Intel Feed Linter☆26Updated 6 years ago
- Python script that gets IOC from MISP and converts it into BRO intel files.☆13Updated 9 years ago
- A collection of bro_scripts and signatures☆27Updated 6 years ago
- Script for generating Bro intel files from pdf or html reports☆77Updated 9 years ago
- Basic Anomaly IDS capabilities with Python and Bro☆105Updated 7 years ago
- Docker container for MISP☆96Updated 7 years ago
- ☆24Updated 5 years ago
- A tool to convert MISP XML files (events and attributes) into graphs☆20Updated 8 years ago
- ☆85Updated 12 years ago
- QRadio ~ Best Threat Intelligence Radio ~ Tune In!☆96Updated 9 years ago
- ☆38Updated 7 years ago
- Harbinger Threat Intelligence☆82Updated 9 years ago
- integrating bro into yara☆33Updated 10 years ago
- **BETA** A simple buildscript for network security monitoring on RHEL/CentOS☆31Updated 8 years ago
- Generates visualizations from the output of flow tools such as SiLK.☆35Updated 8 years ago
- A collection of Bro scripts I've written☆41Updated 10 years ago
- This is a script module for Bro that encapsulates and detects activity related to the Mandiant APT1 report.☆49Updated 11 years ago
- CRITs IOC Visualization in Maltego☆28Updated 10 years ago
- Dockerfiles for NSM tools☆84Updated 8 years ago
- Compare multiple log formats against malware reputation lists.☆88Updated 8 years ago