jasonish / eveboxLinks
Web Based Event Viewer (GUI) for Suricata EVE Events in Elastic Search
☆476Updated 3 weeks ago
Alternatives and similar repositories for evebox
Users that are interested in evebox are comparing it to the libraries listed below
Sorting:
- Scirius is a web application for Suricata ruleset management and threat hunting.☆670Updated 3 months ago
- The tool for updating your Suricata rules.☆285Updated last month
- Suricata IDS/IPS log analytics using the Elastic Stack.☆241Updated 4 years ago
- Suricata, Snort and Zeek IDS rule and pcap testing system☆510Updated 2 weeks ago
- Suricata Extreme Performance Tuning guide☆214Updated 7 years ago
- idstools: Snort and Suricata Rule and Event Utilities in Python (Including a Rule Update Tool)☆283Updated 5 months ago
- Wazuh - Ruleset☆494Updated last year
- A Suricata based NDR distribution☆1,584Updated 3 months ago
- Automated deployment scripts for the RockNSM network hunting distribution.☆456Updated 2 years ago
- Passive Real-time Asset Detection System☆249Updated last year
- Suricata Extreme Performance Tuning guide - Mark II☆121Updated 7 years ago
- Security event correlation engine for ELK stack☆447Updated last year
- DynamiteNSM is a free Network Security Monitor developed by Dynamite Analytics to enable network visibility and advanced cyber threat det…☆171Updated 2 years ago
- Pulled Pork for Snort and Suricata rule management (from Google code)☆442Updated 4 years ago
- a network packet capture compiler☆205Updated 3 years ago
- A Suricata Docker image.☆309Updated last month
- Zeek IDS Dockerfile☆101Updated 3 years ago
- ** README ** This repo has MOVED to https://github.com/quadrantsec/sagan☆229Updated 4 years ago
- A Linux Auditd rule set mapped to MITRE's Attack Framework☆821Updated 5 years ago
- Barnyard2 is a dedicated spooler for Snort's unified2 binary output format.☆354Updated last year
- Zeek Analysis Tools (ZAT): Processing and analysis of Zeek network data with Pandas, scikit-learn, Kafka and Spark☆450Updated last year
- Super Next generation Advanced Reactive honEypot☆473Updated last year
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆448Updated this week
- HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints…☆543Updated 7 months ago
- Rule sets for Sagan☆106Updated 4 years ago
- IntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol.☆1,102Updated 3 weeks ago
- Docker based Suricata, Elasticsearch, Logstash, Kibana, Scirius aka SELKS☆184Updated 3 years ago
- The OTX Suricata Rule Generator can be used to create the rules and configuration for Suricata to alert on indicators from your OTX accou…☆112Updated last year
- An analytical framework for network traffic and behavioral analytics☆456Updated 3 years ago
- Suricata rules for network anomaly detection☆180Updated 3 weeks ago