SuricataLog is a set of tools/ scripts to parse and display Suricata log files (like /var/log/suricata/eve.json)
☆27Feb 16, 2026Updated last month
Alternatives and similar repositories for SuricataLog
Users that are interested in SuricataLog are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A very simple way to try Suricata and EveBox☆15Feb 17, 2025Updated last year
- ☆11Nov 26, 2025Updated 4 months ago
- ☆17Mar 13, 2026Updated 2 weeks ago
- A network packet synthesis language☆23Mar 18, 2026Updated last week
- A tools to work on suricata stats.log file.☆30Oct 14, 2015Updated 10 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Textual application, widget, and testing extensions for building sophisticated user interfaces with Python.☆17Dec 28, 2025Updated 2 months ago
- A Suricata Docker image.☆317Mar 17, 2026Updated last week
- Wireshark plugin to display Suricata analysis info☆94Nov 5, 2021Updated 4 years ago
- [ABANDONED] A Docker container running Suricata and the ELK stack.☆21Jan 27, 2016Updated 10 years ago
- ☆11Jan 10, 2020Updated 6 years ago
- traffic profiles repository contributions☆17Apr 3, 2017Updated 8 years ago
- 之前做系统,要对接AWVS11,写了一个可以python3的调用文档,感兴趣的可以看看☆11Dec 6, 2017Updated 8 years ago
- Bot disponível em todos os canais da Feministech 🤖☆15May 24, 2023Updated 2 years ago
- JAVA Vul Code JAVA常见漏洞与防御代码示例☆10Sep 18, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Kibana 6 Templates for Suricata IDPS Threat Hunting☆24Mar 5, 2019Updated 7 years ago
- Cross-Care☆11Jun 24, 2024Updated last year
- An empirical investigation of deep learning theory☆16Oct 3, 2019Updated 6 years ago
- The tool for updating your Suricata rules.☆294Oct 31, 2025Updated 4 months ago
- Parameter estimation for PDEs☆10Sep 12, 2019Updated 6 years ago
- Suricata rule and intel index☆33Mar 17, 2026Updated last week
- 恶意软件分析套件☆18Jun 27, 2017Updated 8 years ago
- Compilation of algorithms.☆13Jul 3, 2024Updated last year
- Web Based Event Viewer (GUI) for Suricata EVE Events in Elastic Search☆485Updated this week
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Reverse shell auto generator used for Hackthebox/OSCP/Pentest/LABExp☆40Dec 29, 2020Updated 5 years ago
- Collection of various open-source an commercial rulesets for NIDS (especially for Suricata and Snort)☆29Jul 24, 2023Updated 2 years ago
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Dec 1, 2023Updated 2 years ago
- Advent of Code 2023 in Python (63rd place)☆16Dec 25, 2023Updated 2 years ago
- 一款针对中国homeassistant用户的中国气象台天气分钟级接口☆18Mar 2, 2022Updated 4 years ago
- ☆14Jul 21, 2024Updated last year
- 10inhc 4U Reck SDR Station with built in nanoVNA and Red Pitaya☆18Feb 20, 2025Updated last year
- ☆12Feb 16, 2024Updated 2 years ago
- ☆28Aug 29, 2025Updated 6 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- É um conjunto de regras para orientar a conduta e as atividades de um grupo de pessoas de acordo com os seus princípios e objetivos.☆25Jul 14, 2024Updated last year
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆39Aug 18, 2022Updated 3 years ago
- ☆13Mar 31, 2023Updated 2 years ago
- HiddenVM is a futuristic tool powered by KVM designed to combine the powerful amnesic nature of Tails and the impenetrable design of Whon…☆11Jul 22, 2022Updated 3 years ago
- Tool to perform differential fault analysis attack (DFA) on whiteboxes with external encodings.☆16Feb 10, 2023Updated 3 years ago
- UI used to manage Permanent WMI Event Consumers☆14Mar 21, 2015Updated 11 years ago
- Cloud SQL Proxy works with encrypted credential file.☆10Jan 27, 2021Updated 5 years ago