josevnz / SuricataLogLinks
SuricataLog is a set of tools/ scripts to parse and display Suricata log files (like /var/log/suricata/eve.json)
☆24Updated 4 months ago
Alternatives and similar repositories for SuricataLog
Users that are interested in SuricataLog are comparing it to the libraries listed below
Sorting:
- Suricata rules for network anomaly detection☆180Updated last month
- A curated list of awesome things related to Suricata☆212Updated last month
- Convert pcap files into richly-typed ZNG summary logs (Zeek, Suricata, and more)☆92Updated 8 months ago
- Suricata Language Server is an implementation of the Language Server Protocol for Suricata signatures. It adds syntax check, hints and au…☆84Updated last week
- Suricata rules that can detect a wide range of threats, including malware, exploits, and other malicious activity especially web applicat…☆59Updated last year
- ☆38Updated last month
- ☆65Updated 7 years ago
- Open source endpoint agent providing host information to Zeek. [v2]☆90Updated last month
- ☆45Updated 3 years ago
- Collection of various open-source an commercial rulesets for NIDS (especially for Suricata and Snort)☆29Updated 2 years ago
- Collection of Suricata rule sets that I use modified to my environments.☆40Updated 5 years ago
- Kibana 7 Templates for Suricata IDPS Threat Hunting☆43Updated last week
- Packet captures of malicious traffic for analysis using Wireshark☆64Updated 2 years ago
- Sagan is a multi-threads, high performance log analysis engine. At it's core, Sagan similar to Suricata/Snort but with logs rather th…☆190Updated 2 months ago
- ☆56Updated 3 years ago
- The Security Analyst’s Guide to Suricata☆61Updated 8 months ago
- ☆61Updated last week
- A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the…☆63Updated last month
- T-Pot Attack Map that follows ES honeypot events within T-Pot and parses IPs, ports and honeypot info to visualize events in real time.☆43Updated 2 weeks ago
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆67Updated last year
- Suricata rule and intel index☆33Updated last month
- Standard-Format Threat Intelligence Feeds☆126Updated this week
- OpenCTI Python Client☆143Updated last month
- PcapMonkey will provide an easy way to analyze pcap using the latest version of Suricata and Zeek.☆160Updated 9 months ago
- The OTX Suricata Rule Generator can be used to create the rules and configuration for Suricata to alert on indicators from your OTX accou…☆112Updated last year
- Fast IOC and YARA Scanner☆87Updated 5 years ago
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆60Updated 3 years ago
- DynamiteNSM is a free Network Security Monitor developed by Dynamite Analytics to enable network visibility and advanced cyber threat det…☆171Updated 2 years ago
- Threat Intel Platform for T-POTs☆160Updated last week
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆38Updated 3 years ago