A Simple QUEry and Report Tool
☆142Sep 17, 2019Updated 6 years ago
Alternatives and similar repositories for squert
Users that are interested in squert are comparing it to the libraries listed below
Sorting:
- Sguil client for NSM☆223Mar 19, 2024Updated last year
- Barnyard2 is a dedicated spooler for Snort's unified2 binary output format.☆352Apr 11, 2024Updated last year
- Security Onion 16.04 - Linux distro for threat hunting, enterprise security monitoring, and log management☆3,106Apr 16, 2021Updated 4 years ago
- Enterprise Log Search and Archive☆211Dec 22, 2018Updated 7 years ago
- Ruby On Rails Application For Network Security Monitoring☆1,009Jun 6, 2023Updated 2 years ago
- Integrating Sysinternals Autoruns’ logs into Security Onion☆31Feb 20, 2024Updated 2 years ago
- Frontend for Codex Gigas☆21Mar 6, 2017Updated 8 years ago
- DEPRECATED - USE v3 (bearded-avenger)☆229Jan 16, 2018Updated 8 years ago
- Web App for Volatility framework☆390Jan 13, 2026Updated last month
- Sandia Cyber Omni Tracker (SCOT)☆253Nov 4, 2024Updated last year
- OSSEC Decoder & Rulesets for Sysmon Events☆15Jul 23, 2015Updated 10 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆15May 3, 2014Updated 11 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Oct 14, 2020Updated 5 years ago
- Scirius is a web application for Suricata ruleset management and threat hunting.☆673Dec 23, 2025Updated 2 months ago
- Collect, Process, and Hunt with host based data from MacOS, Windows, and Linux☆505Oct 21, 2022Updated 3 years ago
- Zeek Junk Drawer - Just some scripts and a place to put them☆27Sep 22, 2020Updated 5 years ago
- Detect Phishing with Bro IDS☆18Feb 1, 2017Updated 9 years ago
- DNS Enumeration and Reconnaissance Tool☆36Jan 19, 2016Updated 10 years ago
- Network Security Monitoring Framework☆48Oct 19, 2012Updated 13 years ago
- DPS' Lightweight Investigation Notebook☆433Dec 31, 2023Updated 2 years ago
- Fast Incident Response☆1,995Feb 17, 2026Updated 2 weeks ago
- OSINT tool to evaluate the trustworthiness of a company☆41Dec 7, 2019Updated 6 years ago
- CRITs - Collaborative Research Into Threats☆910Jul 29, 2019Updated 6 years ago
- Documentation for the GRR Rapid Reponse framework☆310Feb 18, 2026Updated 2 weeks ago
- Evolving directions on building the best Open Source Forensics VM☆161Jul 5, 2018Updated 7 years ago
- Network traffic sensor☆115Jun 8, 2022Updated 3 years ago
- Process HTTP Pcaps With YARA☆108Jul 29, 2013Updated 12 years ago
- A brief analysis of the BlueBorne Vulnerability Scanner app by Armis☆24Sep 14, 2017Updated 8 years ago
- Pulled Pork for Snort and Suricata rule management (from Google code)☆441Jul 7, 2021Updated 4 years ago
- Defending IaaS with ATT&CK is a project to create a collection of ATT&CK techniques relevant to a Linux IaaS environment, as well as a me…☆14May 28, 2025Updated 9 months ago
- EmerCoin SSH PKI and distributed ACL☆15Mar 4, 2017Updated 9 years ago
- EasyCTF Writeups☆13Jan 10, 2015Updated 11 years ago
- Metasploit Logos that use Z for the new zArch additions☆10Feb 9, 2016Updated 10 years ago
- ☆11Mar 9, 2018Updated 7 years ago
- The PDF Metadata Burp Extension provides an additional passive Scanner check for metadata in PDF files.☆11Jan 10, 2017Updated 9 years ago
- Java client for Hawkular☆11Mar 16, 2017Updated 8 years ago
- ☆11Oct 16, 2022Updated 3 years ago
- The GOSINT framework is a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs).☆556May 9, 2023Updated 2 years ago
- Burp Suite extension to generate Intruder payloads using Radamsa☆89Sep 7, 2017Updated 8 years ago