jasonish / py-idstools
idstools: Snort and Suricata Rule and Event Utilities in Python (Including a Rule Update Tool)
☆281Updated last year
Alternatives and similar repositories for py-idstools:
Users that are interested in py-idstools are comparing it to the libraries listed below
- Suricata Extreme Performance Tuning guide☆208Updated 7 years ago
- Suricata, Snort and Zeek IDS rule and pcap testing system☆474Updated 3 months ago
- Passive Real-time Asset Detection System☆237Updated 10 months ago
- Extract files from network traffic with Zeek.☆101Updated 5 years ago
- Web service for scanning pcaps with snort☆109Updated 6 years ago
- a network packet capture compiler☆199Updated 2 years ago
- DEPRECATED - USE v3 (bearded-avenger)☆227Updated 7 years ago
- Scirius is a web application for Suricata ruleset management and threat hunting.☆650Updated last week
- Suricata IDS/IPS log analytics using the Elastic Stack.☆238Updated 3 years ago
- Rule sets for Sagan☆103Updated 4 years ago
- DGA Domains detection☆66Updated 7 years ago
- Barnyard2 is a dedicated spooler for Snort's unified2 binary output format.☆353Updated last year
- CIF v3 -- the fastest way to consume threat intelligence☆182Updated 2 years ago
- The tool for updating your Suricata rules.☆270Updated 2 weeks ago
- ☆168Updated 3 years ago
- Suspicious DGA from PDNS and Sandbox.☆184Updated 2 years ago
- Honeynet Project generic authenticated datafeed protocol☆214Updated last year
- Docker based Suricata, Elasticsearch, Logstash, Kibana, Scirius aka SELKS☆184Updated 2 years ago
- Zeek Analysis Tools (ZAT): Processing and analysis of Zeek network data with Pandas, scikit-learn, Kafka and Spark☆434Updated last year
- Bro scripts written by CrowdStrike Services☆146Updated 3 years ago
- Web Based Event Viewer (GUI) for Suricata EVE Events in Elastic Search☆455Updated 2 weeks ago
- ☆307Updated 7 years ago
- Bro IDS programs collection.☆146Updated 5 years ago
- Docker files for building Zeek.☆86Updated last year
- Bro scripts to be shared with the community☆109Updated 12 years ago
- Snort in Docker for Network Functions Virtualization (NFV)☆107Updated 5 years ago
- Suricata Extreme Performance Tuning guide - Mark II☆117Updated 7 years ago
- ☆202Updated last year
- An analytical framework for network traffic and behavioral analytics☆451Updated 2 years ago
- Evading Snort Intrusion Detection System.☆77Updated 3 years ago