jakewarren / snort-rule-generator
Quickly generate snort rules for IOCs
☆18Updated 9 years ago
Related projects ⓘ
Alternatives and complementary repositories for snort-rule-generator
- Python script to pull various IOCs from PDFs☆15Updated 9 years ago
- Scripts for Bro IDS and ELK Stack☆56Updated 9 years ago
- Network Forensics Bro scripts & pcap samples☆62Updated 10 years ago
- Cyber Intel Management☆45Updated 6 years ago
- The Intelligent Honey Net Project attempts to create actionable information from honeypots☆62Updated 9 years ago
- Generates visualizations from the output of flow tools such as SiLK.☆35Updated 7 years ago
- integrating bro into yara☆33Updated 9 years ago
- Aggregates security threats from a number of online sources, and outputs to Syslog CEF, Snort Signatures, Iptables rules, hosts.deny, etc…☆79Updated 8 years ago
- Bro scripts to be shared with the community☆109Updated 11 years ago
- Cli interface to threatcrowd.org☆19Updated 7 years ago
- Script for generating Bro intel files from pdf or html reports☆75Updated 8 years ago
- CRITs IOC Visualization in Maltego☆28Updated 9 years ago
- This is a script module for Bro that encapsulates and detects activity related to the Mandiant APT1 report.☆47Updated 10 years ago
- ☆24Updated 8 years ago
- brocon-15 scripts☆13Updated 7 years ago
- Modern Honey Network App for Splunk☆50Updated 5 years ago
- ☆72Updated 2 years ago
- Compare multiple log formats against malware reputation lists.☆88Updated 7 years ago
- ☆38Updated 6 years ago
- Harbinger Threat Intelligence☆82Updated 8 years ago
- **BETA** A simple buildscript for network security monitoring on RHEL/CentOS☆31Updated 7 years ago
- Passive DNS V2☆62Updated 10 years ago
- Unpack MIME attachments from a file and check them against virustotal.com☆45Updated 8 years ago
- Tom's Honey Pot as seen in Applied Network Security Monitoring.☆26Updated 9 years ago
- Detect Phishing with Bro IDS☆18Updated 7 years ago
- OSSEC Decoder & Rulesets for Sysmon Events☆15Updated 9 years ago
- Just another tool to extract Indicator of compromise (ioc) from files☆28Updated 9 years ago