int13h / squertLinks
A Simple QUEry and Report Tool
☆142Updated 5 years ago
Alternatives and similar repositories for squert
Users that are interested in squert are comparing it to the libraries listed below
Sorting:
- Vulnerability Data in ES☆146Updated 7 years ago
- ☆141Updated last year
- Threat Analysis, Reconnaissance, and Data Intelligence System☆125Updated 9 years ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆72Updated 6 years ago
- Repo for autosnort scripts.☆158Updated 4 years ago
- Modern Honey Network App for Splunk☆50Updated 5 years ago
- The Shared Host Integrated Password System (SHIPS) is a solution to provide unique and rotated local super user or administrator password…☆129Updated 7 years ago
- Web service for scanning pcaps with snort☆109Updated 6 years ago
- Docker container for MISP☆96Updated 6 years ago
- ELK configuration files for Forensic Analysts and Incident Handlers (unmaintained)☆179Updated 5 years ago
- Sguil client for NSM☆218Updated last year
- Automatic firewall rule orchestator.☆83Updated 7 years ago
- Compare multiple log formats against malware reputation lists.☆88Updated 7 years ago
- Kvasir: Penetration Test Data Management☆428Updated 6 years ago
- Miscelaneous useful scripts for my day to day projects☆124Updated 4 years ago
- Bro scripts to be shared with the community☆109Updated 12 years ago
- pastebin.com Content Monitoring Tool☆194Updated 12 years ago
- ** README ** This repo has MOVED to https://github.com/quadrantsec/sagan☆228Updated 4 years ago
- Scripts for Bro IDS and ELK Stack☆57Updated 9 years ago
- Sandia Cyber Omni Tracker (SCOT)☆246Updated 6 months ago
- Next Generation Firewall Audit and Bypass Tool☆265Updated 8 years ago
- GoatRider is a simple tool that will dynamically pull down Artillery Threat Intelligence Feeds, TOR, AlienVaults OTX, and the Alexa top 1…☆139Updated 6 years ago
- ☆71Updated 3 years ago
- Honeypot Intelligence with Splunk☆254Updated 6 years ago
- QRadio ~ Best Threat Intelligence Radio ~ Tune In!☆96Updated 9 years ago
- Common Vulnerabilities and Exposures - Portal. Archived and now replaced by vulnerability-lookup.org☆85Updated 2 months ago
- Graylog Processing Pipeline functions to enrich log messages with IoC information from threat intelligence databases☆154Updated last year
- The Seeker of IOC☆129Updated 4 years ago
- A powershell script for creating a Windows honeyport.☆89Updated 2 months ago
- Dockerfiles for NSM tools☆84Updated 8 years ago