jingconan / pcap-converter
Pcap Converter: convert pcap to text or flows.
☆49Updated 4 years ago
Alternatives and similar repositories for pcap-converter:
Users that are interested in pcap-converter are comparing it to the libraries listed below
- A completely automated anomaly detector Zeek network flows files (conn.log).☆75Updated 5 months ago
- Use PyShark and scapy to read fields from a pcap file and populate a CSV☆55Updated 4 years ago
- A Zeek script to generate features based on timing, volume and metadata for traffic classification.☆54Updated 4 years ago
- The stratosphere testing framework is mean to help in the researching and verification of the behavioral models used by the Stratoshpere …☆50Updated 6 years ago
- ICS Cybersecurity PCAP respository☆51Updated 6 years ago
- • Packet capture (PCAP) file analysis to analyze traffic sent by malicious IP address.☆12Updated 10 years ago
- calculate flow information from PCAP and extract tcp streams☆69Updated 6 months ago
- Evading Snort Intrusion Detection System.☆76Updated 3 years ago
- Machine Learning based Intrusion Detection Systems are difficult to evaluate due to a shortage of datasets representing accurately networ…☆104Updated 4 years ago
- Download pcap files from http://www.malware-traffic-analysis.net/☆74Updated 7 years ago
- Coburg Intrusion Detection Data Sets☆48Updated 7 years ago
- A set of ICS IDS rules for use with Suricata.☆49Updated last year
- nPrint provides a generalizable data representation for network packets that works directly with machine learning techniques☆104Updated 2 years ago
- Pcap-splitter allows you to split a pcap file into subsets of pcap files based on sessions, flows, ip addresses, number of bytes, number …☆66Updated 5 years ago
- This is a malware analysis project which expecte to generate snort rule via malicious network traffic☆28Updated last year
- Detect cryptocurrency mining traffic with Zeek.☆46Updated 3 years ago
- A collection of resources for security data☆40Updated 7 years ago
- aka GENESIDS: Reads and parses rules using a "snort like" syntax and generates and sends packets that trigger events in signature based I…☆22Updated 6 years ago
- System for network traffic analysis and anomaly detection.☆89Updated 3 months ago
- Data sets and examples for Jask Labs Blackhat 2017 Handout: Top 10 Machine Learning Cyber Security Use Cases☆31Updated 7 years ago
- idstools: Snort and Suricata Rule and Event Utilities in Python (Including a Rule Update Tool)☆281Updated last year
- Docker files for building Zeek.☆86Updated last year
- Mapping NSM rules to MITRE ATT&CK☆68Updated 4 years ago
- ISCXFlowMeter is an Ethernet traffic flow generator and analyzer for anomaly detection which has been used in different network security …☆70Updated 11 months ago
- Wireshark plugin to display Suricata analysis info☆93Updated 3 years ago
- Intrusion Prevention System to dynamically add firewall rules to block malicious traffic detected by IDS system implemented on Software D…☆51Updated 7 years ago
- IDS based on Machine Learning technical☆19Updated 6 years ago
- This Network Intrusion Detection System (IDS) is network-based, and it will receive suspicious packet capture files from a network monito…☆14Updated last year
- DGA Domains detection☆62Updated 6 years ago
- tcp pcap to weka☆20Updated 7 years ago